8e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 394.526344][T17034] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) 11:04:13 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3e", 0x7c}, {0x0}], 0x2) getresuid(&(0x7f0000000300), 0x0, &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:13 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(0xffffffffffffffff, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8adfa61ef19e85e8092f8a9d41cc6d56a82dadb1a7dc79e65d683ad6b9dad07f6d729c4db04b7e0c5", 0x35}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x0, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:14 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3e", 0x7c}, {0x0}], 0x2) getresuid(&(0x7f0000000300), 0x0, &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x0, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:14 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:14 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc7", 0x10}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:14 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:14 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc7", 0x10}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) [ 395.512103][T17095] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 11:04:14 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) [ 395.579124][T17092] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 395.640681][T17095] FAT-fs (loop5): Filesystem has been set read-only [ 395.654439][T17092] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 11:04:14 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc7", 0x10}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x0, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:15 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:15 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3e", 0x7c}, {0x0}], 0x2) getresuid(&(0x7f0000000300), 0x0, &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:15 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3e", 0x7c}, {0x0}], 0x2) getresuid(&(0x7f0000000300), 0x0, &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:15 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a", 0x11}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:15 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:15 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a", 0x11}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:15 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3e", 0x7c}, {0x0}], 0x2) getresuid(&(0x7f0000000300), 0x0, &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:15 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) [ 396.544899][T17150] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 11:04:15 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a", 0x11}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) [ 396.609700][T17150] FAT-fs (loop5): Filesystem has been set read-only 11:04:15 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3e", 0x7c}, {0x0}], 0x2) getresuid(&(0x7f0000000300), 0x0, &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) [ 396.698420][T17135] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 396.871923][T17135] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 11:04:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:16 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:16 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {0x0}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x0, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:16 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3e", 0x7c}, {0x0}], 0x2) getresuid(&(0x7f0000000300), &(0x7f0000000480), 0x0) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:16 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3e", 0x7c}, {0x0}], 0x2) getresuid(&(0x7f0000000300), &(0x7f0000000480), 0x0) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:16 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:16 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3e", 0x7c}, {0x0}], 0x2) getresuid(&(0x7f0000000300), &(0x7f0000000480), 0x0) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:16 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) [ 397.549326][T17189] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 397.647508][T17189] FAT-fs (loop5): Filesystem has been set read-only [ 397.736699][T17183] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 397.745059][T17183] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 11:04:17 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3e", 0x7c}, {0x0}], 0x2) getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, 0x0) 11:04:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000002c0)) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:17 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {0x0}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x0, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000002c0)) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:17 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {0x0}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000002c0)) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:18 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:18 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x0, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:18 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) [ 399.559816][T17255] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 399.617175][T17253] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 399.634397][T17255] FAT-fs (loop4): Filesystem has been set read-only [ 399.658326][T17253] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 11:04:18 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, 0x0) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:18 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8adfa61ef19e85e8092f8a9d41cc6", 0x1b}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, 0x0) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 400.249720][T17300] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 400.308524][T17279] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 400.318936][T17300] FAT-fs (loop3): Filesystem has been set read-only [ 400.402651][T17279] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 11:04:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, 0x0) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) 11:04:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000002c0)) getegid() getresuid(0x0, &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:20 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03", 0x1}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:20 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000002c0)) getegid() getresuid(0x0, &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:20 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000002c0)) getegid() getresuid(0x0, &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) 11:04:20 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000002c0)) getegid() getresuid(&(0x7f0000000300), 0x0, &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:21 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03", 0x1}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:21 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000002c0)) getegid() getresuid(&(0x7f0000000300), 0x0, &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x0, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) 11:04:21 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03", 0x1}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:21 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8ad", 0xe}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) 11:04:22 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8ad", 0xe}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:22 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000002c0)) getegid() getresuid(&(0x7f0000000300), 0x0, &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) 11:04:22 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8ad", 0xe}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x0, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:22 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8adfa61ef19e85e80", 0x15}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:23 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8adfa61ef19e85e80", 0x15}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:23 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8adfa61ef19e85e80", 0x15}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:23 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000002c0)) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), 0x0) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) 11:04:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) 11:04:23 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000002c0)) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), 0x0) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x0, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:24 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000002c0)) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), 0x0) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:24 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000002c0)) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, 0x0) 11:04:24 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8adfa61ef19e85e8092f8a9", 0x18}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) [ 405.348853][T17495] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 405.448451][T17495] FAT-fs (loop1): Filesystem has been set read-only 11:04:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x0, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:24 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8adfa61ef19e85e8092f8a9", 0x18}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 405.629304][T17469] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) [ 405.696480][T17469] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) 11:04:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:25 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8adfa61ef19e85e8092f8a9", 0x18}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:25 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8adfa61ef19e85e8092f8a9d41c", 0x1a}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:25 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000002c0)) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, 0x0) 11:04:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x0, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:25 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x440400, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="2d85fe25f9068cf7391c6ca6756c7cc74a2b", 0x12}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000002c0)) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, 0x0) 11:04:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x0, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:26 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8adfa61ef19e85e8092f8a9d41c", 0x1a}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:26 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8adfa61ef19e85e8092f8a9d41c", 0x1a}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x0, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:27 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3efe260cdff79523c776a6570d4a5025408081fff8b6de937c5f87dff6224fcfb0b09c64d8aab8aa17cd13ae6427952ab71f3bf8ed68e88166ce6d31245528303cce19dcb47d9366f2557cc27204f4d2d311e8c712a2e5f67d03fecf0865b7a50a42dd13f96a34d06a912ac92db48f752439127a8bb44ffca9fa4600", 0xf7}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8ad", 0xe}], 0x3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) 11:04:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) 11:04:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:28 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8adfa61ef19e85e8092f8a9d41cc6", 0x1b}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x0, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:29 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8adfa61ef19e85e8092f8a9d41cc6", 0x1b}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:30 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8adfa61ef19e85e8092f8a9d41cc6", 0x1b}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x0, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:31 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x0, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:32 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:33 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0), 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f00000009c0)}], 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getegid() getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) getgroups(0x0, &(0x7f0000000bc0)) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000600)={0xc0, 0xfffffffffffffff5, 0x4, [{{0x0, 0x1, 0x0, 0x0, 0xb, 0x0, {0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1ff, 0x3f, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x1c7}}, {0x0, 0x0, 0x11, 0x0, '/dev/dlm-control\x00'}}]}, 0xc0) 11:04:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x0, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x0, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:33 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {0x0}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x0, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x0, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f", 0x5e}, {0x0}], 0x2) getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f0000000b00)}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f0000000b00)}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x0, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f0000000b00)}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x0, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:36 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8ad", 0xe}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:36 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f0000000b00)="03eef80c4dcadaaf794c1290c8ad", 0xe}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:36 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3e", 0x7c}, {0x0}], 0x2) getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:36 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3e", 0x7c}, {0x0}], 0x2) getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x0, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:36 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgid() writev(r2, &(0x7f0000000b80)=[{&(0x7f00000009c0)="de9cb852a4af81ee09811a6301b677ac54546d48a9fd131d7e522c845f2e0c1979a0c9c818f8f57683e3384241b86f4ab0b708bd204378d5609f5a36be104e1072af54c4652b4fdb0b01cef4e8a0a4308166abf56035c68c58335405461f9bf05391d59b2226c3feada768f33f06c45c6c906045b19ee3daf8564f3e", 0x7c}, {0x0}], 0x2) getresuid(&(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) [ 417.823466][T17948] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 417.907336][T17951] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 417.952059][T17948] FAT-fs (loop4): Filesystem has been set read-only 11:04:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x0, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x0, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 417.994566][T17951] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 418.031017][T17951] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 418.084924][T17972] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 418.093394][T17951] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 11:04:37 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f0000000b00)="03", 0x1}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) [ 418.157105][T17972] FAT-fs (loop3): Filesystem has been set read-only [ 418.169695][T17947] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 418.193492][T17965] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 418.203759][T17965] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 418.258503][T17965] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 11:04:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 418.327544][T17965] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 418.394035][T17961] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 11:04:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x0, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 418.844716][T17993] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 418.846529][T17996] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 418.964347][T17996] FAT-fs (loop4): Filesystem has been set read-only [ 419.034495][T17996] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 419.133647][T17996] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 419.191758][T18003] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 419.198316][T17996] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 11:04:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 419.244040][T18003] FAT-fs (loop3): Filesystem has been set read-only 11:04:38 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f0000000b00)="03", 0x1}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 419.289482][T17992] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 419.307045][T17999] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 419.317155][T17999] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 11:04:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:38 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f0000000b00)="03", 0x1}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x0, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:39 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000008c0)="f2897b97829e87292c738d8533bca15b93e8a37fbd5f0f144258b479244a34b8091c5e4a41ad6eea5830a132b001d7f150e463c4a83cc5f3fbac4983288951349026059a6b7252939ce8e9c9fa20c83a39439948f8d93ec3f4a45588aca6d4db5fdbcb87be21f515f3a01bbcf8c3aece482a4840b9f666bcd5c06f16e67c302d5d1401e48bc8ac0c9bc357463e5bffc0d874c9687ccb86ad0800467d15d492dae4517e30c1664d50d1395e30e4e0c39b2b66ada6b86d2ae54cbc17d08f09005c502d9d113c60d9b283474038268f83afce452cebf79a6654cc8f05570d7574fd1af7483bc351c143f0e9b4fdfb690f8a857f9644a467859876", 0xf9}, {&(0x7f0000000b00)}], 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x0, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:41 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000b00)}], 0x1) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:41 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000b00)}], 0x1) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0x0, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 422.791671][T18139] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 422.910964][T18139] FAT-fs (loop5): Filesystem has been set read-only 11:04:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 423.027953][T18133] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 423.061215][T18133] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 11:04:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0x0, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:42 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000b00)}], 0x1) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0x0, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x0, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:43 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{0x0}], 0x1) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x0, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:45 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{0x0}], 0x1) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:45 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{0x0}], 0x1) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0x0, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x0, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:46 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{0x0}], 0x1) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x0, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:47 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000b00)}], 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 428.307770][T18320] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 428.427367][T18320] FAT-fs (loop5): Filesystem has been set read-only [ 428.507212][T18316] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 428.552716][T18316] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 11:04:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x0, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x0, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 428.694244][T18339] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 428.726706][T18339] FAT-fs (loop3): Filesystem has been set read-only 11:04:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 428.813629][T18336] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 428.876598][T18336] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 11:04:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:48 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000b00)}], 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x0, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x0, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:49 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000b00)}], 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x0, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x0, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:50 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000b00)}], 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000002c0)) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x0, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x0, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:51 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000b00)}], 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getuid() getgroups(0x0, &(0x7f0000000bc0)) 11:04:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x0, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 432.771602][T18486] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 432.940403][T18486] FAT-fs (loop3): Filesystem has been set read-only [ 433.077887][T18474] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 433.106050][T18474] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 11:04:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x0, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:52 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x440400, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000180)=0xe692, 0x5) sendfile(r0, r0, 0x0, 0x2000005) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) writev(r3, &(0x7f0000000b80)=[{&(0x7f0000000b00)}], 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getuid() getgroups(0x0, 0x0) 11:04:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x0, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:53 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x0, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x0, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x0, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x0, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:56 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0xf, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 11:04:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:57 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0xd0, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) accept4$inet(r0, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00859) 11:04:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0xd0, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) getresuid(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e003c5) 11:04:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x4a, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x2, 0x0, 0x800e005cf) 11:04:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00779) 11:04:58 executing program 2: open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x3ff) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x1, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81f00}], 0x100000000000003c) 11:04:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:58 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="cdbf0e000084aaaaaaaaaabb86dd6002290f00303a0000000000000000000000000000000000ff0200000000000000000000000000018f00907800000000609433df00000000000000000000000000000000000000010000000000000000f3000000000000007dccfe6bd0b548366932a0ad38982dddfb643811ba784c2d4c846cc59cdcd3a18db571ac8b2f6240ec9f1f3d30353e9d0a3766d73345b3e1874bd69da091960b4aceeac4b61f6a43209c9de89ba28ad67aa36650e242d049179c4258c08e3d4263cabcd758073c917388f52845aface645b434da227c154f84271e5664da1d3ed1bd2d6ad71e18b9057be4f6861f769088977a"], 0x0) [ 439.498033][T18732] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 439.509225][T18732] FAT-fs (loop3): Filesystem has been set read-only 11:04:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 439.591872][T18727] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 439.629678][T18727] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 11:04:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0xe, &(0x7f0000000080)={@broadcast, @random="6c949b23387b"}, 0x0) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000440)="4d0d2bdf38de89f24cbed5843f0e9cd7e8ed36a04b1eeb357acadf56b47f52114d3df8e6018f56b588504ff45905d91d8d972b0694171c5c38d807dae5ef5fac0078991c35f5d46ddc5927dad894448b8b5021d3a61fde5cfbdb71dde9b747c9aa04497835385222a982be173959099b7c91e3603cf78b93dd20e1216b29d1bb6e118580a7cdbbc2251ab105caa8a58063d4dab7ba0c82d3879678e8a1cc21d1cebce3e1ec348ca3b0a1c7a5ce3a508417f650e331c11e4f6c2e7c882f35c158136b8dd466cf2846e11a5c0b98138ededd931dbc982f5d6b1cc241e73d4e2286ceaa66391d8c0b997bb42a7f040ae6ae1220db", 0xf3}, {0x0}], 0x2) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e0081d) 11:04:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:59 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x0, 0x0, 0x0) geteuid() recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e003c5) 11:04:59 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') utimensat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 11:04:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000280)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}}}}}}, 0x0) r1 = socket$inet6(0x1c, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0x66, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x2, 0x0, 0x800e005bd) 11:04:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:04:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) setsockopt$inet_int(r0, 0x0, 0x46, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00358) 11:05:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:00 executing program 1: lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:05:00 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x100000000000202) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)=0x983) 11:05:00 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000180)=0x1) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_open_dev$usb(0x0, 0x9, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@local, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev, @in=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000004c0)=0x240) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) stat(&(0x7f0000000580)='./file0\x00', 0x0) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', 0x0, 0x101, 0x0, &(0x7f0000000180), 0x10000, &(0x7f0000000640)=ANY=[@ANYBLOB=',subj_type=/dev/']) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x4) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f00000000c0)) 11:05:00 executing program 2: r0 = epoll_create1(0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0x400000000000328, 0x0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, 0x0) 11:05:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:00 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x1000000, 0x76459c7f, 0x40}, 0x10) 11:05:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000001c0)={0x0, 0x0}) 11:05:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:01 executing program 2: r0 = epoll_create1(0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0x400000000000328, 0x0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, 0x0) 11:05:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8001000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x6c, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 11:05:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:01 executing program 1: socket$packet(0x11, 0x2, 0x300) socket$xdp(0x2c, 0x3, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:05:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000800)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x1}}], 0x20}], 0x1, 0x0) 11:05:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800a1695e0bcfe87b0071") syz_genetlink_get_family_id$team(0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = open(&(0x7f00000013c0)='./bus\x00', 0x40000141042, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x323) creat(&(0x7f00000012c0)='./bus\x00', 0x0) getpid() r2 = open(&(0x7f0000000240)='./bus\x00', 0x100141042, 0x0) write$binfmt_misc(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="1af02fe562cda89271ffa1b0732a4d47d6f326f6e7d045d6"], 0x18) sendfile(r2, r2, &(0x7f00000000c0), 0xfff) sendfile(r1, r2, 0x0, 0x8fff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b80)={{{@in=@loopback, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@local}}, 0x0) 11:05:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x27c) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:05:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 442.755751][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 442.761746][ C0] protocol 88fb is buggy, dev hsr_slave_1 11:05:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:02 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000200)="0800a1695e0bcfe87b0071") recvmsg(r0, &(0x7f0000000180)={0x0, 0xfdd2, 0x0, 0x0, 0x0, 0xffffffffffffff5d}, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000002c0)) [ 443.076083][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 443.082379][ C1] protocol 88fb is buggy, dev hsr_slave_1 11:05:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) close(r1) [ 443.235506][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 443.241383][ C0] protocol 88fb is buggy, dev hsr_slave_1 11:05:02 executing program 1: socket$packet(0x11, 0x2, 0x300) socket$xdp(0x2c, 0x3, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:05:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0800a1695e0bcfe87b0071") r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f", 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f0000000000)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) close(r1) [ 443.635474][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 443.641449][ C0] protocol 88fb is buggy, dev hsr_slave_1 11:05:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') chdir(0x0) symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') symlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file1\x00') ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, 0x0) 11:05:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 444.035494][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 444.041347][ C0] protocol 88fb is buggy, dev hsr_slave_1 11:05:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000080)=0x1000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) poll(&(0x7f00000006c0)=[{r0}], 0x1, 0x0) 11:05:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') chdir(0x0) symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') symlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file1\x00') ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, 0x0) 11:05:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x3}) 11:05:03 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(r1, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000000)) 11:05:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(r1, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:04 executing program 1: socket$packet(0x11, 0x2, 0x300) socket$xdp(0x2c, 0x3, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:05:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000580)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(r1, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 445.257355][T18969] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 445.295559][T18965] FAT-fs (loop2): bogus number of reserved sectors [ 445.329492][T18960] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 445.339149][T18965] FAT-fs (loop2): Can't find a valid FAT filesystem [ 445.373268][T18969] FAT-fs (loop4): Filesystem has been set read-only [ 445.403958][T18960] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 11:05:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(r1, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chmod(&(0x7f0000000140)='./file0\x00', 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x44000) io_setup(0x4ed4, &(0x7f0000000100)=0x0) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000940)) getpgrp(0xffffffffffffffff) fstat(r1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a80)={{{@in=@remote, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000b80)=0xe8) getgroups(0x5, &(0x7f0000000bc0)=[0xffffffffffffffff, 0xee01, 0x0, 0xffffffffffffffff, 0xffffffffffffffff]) stat(&(0x7f0000000d80)='./file1\x00', &(0x7f0000000dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001300)) getgroups(0x5, &(0x7f0000001400)=[0x0, 0xffffffffffffffff, 0xee01, 0x0, 0xffffffffffffffff]) getpgrp(0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001680), &(0x7f00000016c0)=0xc) stat(&(0x7f0000001700)='./bus\x00', &(0x7f0000001740)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000001d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@empty, @in=@local}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000001e80)=0xe8) lstat(&(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)) getpgrp(0x0) lstat(&(0x7f00000028c0)='./bus\x00', &(0x7f0000002900)) fstat(0xffffffffffffffff, 0x0) getresuid(&(0x7f0000004e00), &(0x7f0000004e40), 0x0) fstat(r4, &(0x7f0000004ec0)) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000006500)) getegid() epoll_create1(0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 11:05:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:04 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) readv(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:05 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) readv(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:05 executing program 1: socket$packet(0x11, 0x2, 0x300) socket$xdp(0x2c, 0x3, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:05:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:05 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) readv(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:05 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) 11:05:05 executing program 0: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:05 executing program 0: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:05 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000000c0), 0x0, 0x0, 0x8) r0 = getpid() rt_sigtimedwait(&(0x7f00000001c0), 0x0, 0x0, 0x8) ptrace(0x10, r0) ptrace(0x8, r0) ptrace(0x8, r0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) 11:05:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:06 executing program 0: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(r1, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:06 executing program 1: socket$packet(0x11, 0x2, 0x300) socket$xdp(0x2c, 0x3, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 11:05:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(r1, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(r1, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:07 executing program 2: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0xffffffff}}, 0x0) [ 447.795514][ C0] net_ratelimit: 14 callbacks suppressed [ 447.795522][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 447.807070][ C0] protocol 88fb is buggy, dev hsr_slave_1 11:05:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bridge_slave_0\x00', 0x0}) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f00000000c0)=r2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'ro^e\x00\x00\x10\x00', 0x10000001a}) 11:05:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:07 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:07 executing program 2: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) kexec_load(0x0, 0x10, &(0x7f0000000000)=[{0x0}], 0x0) [ 448.195475][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 448.201376][ C0] protocol 88fb is buggy, dev hsr_slave_1 11:05:07 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:07 executing program 1: socket$packet(0x11, 0x2, 0x300) socket$xdp(0x2c, 0x3, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 11:05:07 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) readv(r1, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) readv(r1, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 448.995491][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 449.001339][ C0] protocol 88fb is buggy, dev hsr_slave_1 11:05:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) readv(r1, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) [ 449.325468][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 449.331353][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 449.354420][T19141] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 449.397402][T19141] FAT-fs (loop4): Filesystem has been set read-only [ 449.475913][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 449.482063][ C0] protocol 88fb is buggy, dev hsr_slave_1 11:05:09 executing program 2: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) kexec_load(0x0, 0x10, &(0x7f0000000000)=[{0x0}], 0x0) 11:05:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:09 executing program 1: socket$packet(0x11, 0x2, 0x300) socket$xdp(0x2c, 0x3, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 11:05:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="04141b74a9d2da8ba968dc88f617b7d04980da55f9c75de4cf935accd67beaa2006177eefba7f0b4e5a459b7cbc009e4700f2e9bbae28454d761f1d870469e0e88ef700f729afd3219434ef4e7a4c947aeab6e82595f067f6a1706a1c78a1e3e085ce4c59bedfc7abb0a19a835efd968a15169e103fbcc566ae6d9257d6a66fc2a1f11ae5ec6dfbee67570b97b42d846aefdcb543958df772d2c3bf6502e4ab4fec6ebb35d86e68b53c7c64b3c9951030605346de5351688610b30e349210cedeabd9b5825fc06c092f69c7a4b26986955104dc3a904cb539ee86c0a01e0de3caac5aae6e4c808e1e2c496543bdc145ad4c6e001fae66a673c4471"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) 11:05:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/151, 0x97}], 0x1) [ 450.973168][T19174] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 450.997517][T19182] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 451.007690][T19174] FAT-fs (loop4): Filesystem has been set read-only [ 451.015037][T19182] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) [ 451.047304][T19165] FAT-fs (loop4): error, invalid access to FAT (entry 0x00006500) 11:05:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x0, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x20a, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 11:05:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(r1, 0x0, 0x0) 11:05:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='memory.swap.max\x00', 0x2, 0x0) readv(r1, 0x0, 0x0) 11:05:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb4450, 0x2, 0x57, 0x0, 0x0, 0x6, 0x8, 0x9, 0x0, 0x80000000, 0x4, 0x0, 0x7000000000000, 0x0, 0x0, 0x6, 0x8, 0x8, 0x4, 0x8000000000, 0x9, 0xc46, 0x3, 0x6, 0x0, 0x401, 0x7fff, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xc9e1, 0x8000}, 0x0, 0x6, 0x0, 0x2, 0x3, 0xfffffffffffffff7, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8004) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000003c0)={0x0, 0x3, 0x7fe000000000}) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000018c0)={0x0, 0x1000}) write$binfmt_aout(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e0ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e7bcdda4a9dbe3bfc1deea690e1b2ae74539f93951bd347b009f0a200b61649ca2b293fa3c8"], 0x8e) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000780)={0x5, 0x100000001, 0x3, {0x77359400}, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) getcwd(&(0x7f0000000880)=""/4096, 0x1000) setxattr$security_evm(0x0, &(0x7f0000000180)='security.evm\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x1, 0x2) move_mount(r0, &(0x7f0000000100)='./bus\x00', r2, &(0x7f0000000300)='./file0\x00', 0x25) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000580)={'filter\x00', 0xa0, "386fccd37bd7113f842b29c2f3894b9f6e6251264c9e555ed5442c25386edc5569789ed34c4650127c97bd61db8a6080d3fdf5a6179ad6c2f5511c87ad21119064028b0cfa83bc8fa3e61d82b7dd49b7558f1ff13e1613b2a52112b9da897f93a48403987e12a23a8849155649a3d1b180b267ff22036a91e8c81486e922bb8fe75bd71c4e2bb058a611a01207526a6f8b13c62a6ee4827fdd58fe735ed17ee2"}, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) stat(0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) [ 451.886552][T19214] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 451.906679][T19210] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 451.918016][T19214] FAT-fs (loop5): Filesystem has been set read-only [ 451.926808][T19210] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 451.939807][T19210] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 451.949517][T19210] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 451.968404][T19209] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 611.715773][ T1045] INFO: task syz-executor.2:19186 can't die for more than 143 seconds. [ 611.724229][ T1045] syz-executor.2 R running task 29744 19186 8639 0x00004006 [ 611.737860][ T1045] Call Trace: [ 611.741230][ T1045] ? rcu_read_lock_sched_held+0x110/0x130 [ 611.750570][ T1045] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 611.759151][ T1045] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 611.764633][ T1045] ? __alloc_pages_slowpath+0x2900/0x2900 [ 611.773377][ T1045] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 611.782618][ T1045] ? retint_kernel+0x2b/0x2b [ 611.790108][ T1045] ? alloc_pages_current+0x10f/0x210 [ 611.799366][ T1045] ? set_memory_decrypted+0x9/0x10 [ 611.804491][ T1045] ? arch_kexec_post_alloc_pages+0x9/0x10 [ 611.813128][ T1045] ? kimage_alloc_page+0x3a4/0x9f0 [ 611.821148][ T1045] ? write_comp_data+0x10/0x70 [ 611.828914][ T1045] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 611.835165][ T1045] ? kimage_alloc_page+0x38b/0x9f0 [ 611.843221][ T1045] ? kimage_load_segment+0x25d/0x740 [ 611.851480][ T1045] ? do_kexec_load+0x41a/0x600 [ 611.859185][ T1045] ? __x64_sys_kexec_load+0x1d5/0x260 [ 611.864616][ T1045] ? do_syscall_64+0xfd/0x680 [ 611.872223][ T1045] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 611.882011][ T1045] [ 611.882011][ T1045] Showing all locks held in the system: [ 611.892722][ T1045] 1 lock held by khungtaskd/1045: [ 611.900740][ T1045] #0: 00000000ffabdcd1 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 611.913040][ T1045] 1 lock held by rsyslogd/8505: [ 611.920825][ T1045] #0: 0000000054f3a1f5 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 611.932404][ T1045] 2 locks held by getty/8595: [ 611.940021][ T1045] #0: 0000000022519bd1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 611.952080][ T1045] #1: 0000000063067952 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 611.968434][ T1045] 2 locks held by getty/8596: [ 611.973113][ T1045] #0: 00000000cecb5ff4 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 611.984292][ T1045] #1: 00000000974f5292 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 611.999728][ T1045] 2 locks held by getty/8597: [ 612.004405][ T1045] #0: 000000004ec66662 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 612.015223][ T1045] #1: 000000001fdbf4c6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 612.030579][ T1045] 2 locks held by getty/8598: [ 612.035256][ T1045] #0: 00000000abb068b5 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 612.044445][ T1045] #1: 0000000068bb521f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 612.059919][ T1045] 2 locks held by getty/8599: [ 612.064596][ T1045] #0: 000000006d7877b4 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 612.074804][ T1045] #1: 00000000773c4590 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 612.090465][ T1045] 2 locks held by getty/8600: [ 612.095140][ T1045] #0: 0000000017db31eb (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 612.104444][ T1045] #1: 00000000db8d1c1c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 612.121178][ T1045] 2 locks held by getty/8601: [ 612.127098][ T1045] #0: 00000000a3741405 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 612.141880][ T1045] #1: 00000000994b3d30 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 612.152686][ T1045] 1 lock held by syz-executor.2/19186: [ 612.163097][ T1045] [ 612.166634][ T1045] ============================================= [ 612.166634][ T1045] [ 612.175042][ T1045] NMI backtrace for cpu 0 [ 612.179467][ T1045] CPU: 0 PID: 1045 Comm: khungtaskd Not tainted 5.2.0-rc3-next-20190607 #11 [ 612.188133][ T1045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.198177][ T1045] Call Trace: [ 612.201526][ T1045] dump_stack+0x172/0x1f0 [ 612.205867][ T1045] nmi_cpu_backtrace.cold+0x63/0xa4 [ 612.211064][ T1045] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 612.216697][ T1045] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 612.222675][ T1045] arch_trigger_cpumask_backtrace+0x14/0x20 [ 612.228564][ T1045] watchdog+0xb88/0x12b0 [ 612.232810][ T1045] kthread+0x354/0x420 [ 612.236969][ T1045] ? reset_hung_task_detector+0x30/0x30 [ 612.242509][ T1045] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 612.248748][ T1045] ret_from_fork+0x24/0x30 [ 612.253333][ T1045] Sending NMI from CPU 0 to CPUs 1: [ 612.258869][ C1] NMI backtrace for cpu 1 [ 612.258876][ C1] CPU: 1 PID: 19186 Comm: syz-executor.2 Not tainted 5.2.0-rc3-next-20190607 #11 [ 612.258883][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.258887][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x18/0x50 [ 612.258898][ C1] Code: 00 00 00 00 e9 a4 e9 ff ff 90 90 90 90 90 90 90 90 90 55 48 89 e5 48 8b 75 08 65 48 8b 04 25 c0 fd 01 00 65 8b 15 b0 1f 91 7e <81> e2 00 01 1f 00 75 2b 8b 90 f0 12 00 00 83 fa 02 75 20 48 8b 88 [ 612.258903][ C1] RSP: 0018:ffff88802e357d80 EFLAGS: 00000202 [ 612.258911][ C1] RAX: ffff88802e34a180 RBX: 0000000029a5c008 RCX: ffffffff816803f0 [ 612.258916][ C1] RDX: 0000000080000000 RSI: ffffffff816803fe RDI: 0000000000000007 [ 612.258921][ C1] RBP: ffff88802e357d80 R08: ffff88802e34a180 R09: ffffed1015d26be0 [ 612.258927][ C1] R10: ffffed1015d26bdf R11: ffff8880ae935efb R12: ffff888029a4e070 [ 612.258932][ C1] R13: 0000000000000000 R14: 00000000041eb000 R15: dffffc0000000000 [ 612.258938][ C1] FS: 00007f8007dbb700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 612.258942][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 612.258947][ C1] CR2: ffffffffff600400 CR3: 000000005a174000 CR4: 00000000001406e0 [ 612.258953][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 612.258958][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 612.258961][ C1] Call Trace: [ 612.258964][ C1] kimage_alloc_page+0x32e/0x9f0 [ 612.258968][ C1] kimage_load_segment+0x25d/0x740 [ 612.258972][ C1] do_kexec_load+0x41a/0x600 [ 612.258976][ C1] __x64_sys_kexec_load+0x1d5/0x260 [ 612.258979][ C1] do_syscall_64+0xfd/0x680 [ 612.258983][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.258987][ C1] RIP: 0033:0x459279 [ 612.258998][ C1] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 612.259002][ C1] RSP: 002b:00007f8007dbac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f6 [ 612.259011][ C1] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459279 [ 612.259016][ C1] RDX: 0000000020000000 RSI: 0000000000000010 RDI: 0000000000000000 [ 612.259021][ C1] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 612.259027][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8007dbb6d4 [ 612.259032][ C1] R13: 00000000004c51b9 R14: 00000000004d9258 R15: 00000000ffffffff [ 612.269403][ T1045] Kernel panic - not syncing: hung_task: blocked tasks [ 612.511819][ T1045] CPU: 0 PID: 1045 Comm: khungtaskd Not tainted 5.2.0-rc3-next-20190607 #11 [ 612.520488][ T1045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.533776][ T1045] Call Trace: [ 612.537084][ T1045] dump_stack+0x172/0x1f0 [ 612.541432][ T1045] panic+0x2cb/0x744 [ 612.545329][ T1045] ? __warn_printk+0xf3/0xf3 [ 612.549915][ T1045] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 612.555550][ T1045] ? ___preempt_schedule+0x16/0x18 [ 612.560665][ T1045] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 612.566825][ T1045] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 612.572991][ T1045] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 612.580070][ T1045] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 612.586236][ T1045] watchdog+0xb99/0x12b0 [ 612.590494][ T1045] kthread+0x354/0x420 [ 612.594565][ T1045] ? reset_hung_task_detector+0x30/0x30 [ 612.600118][ T1045] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 612.606365][ T1045] ret_from_fork+0x24/0x30 [ 612.612707][ T1045] Kernel Offset: disabled [ 612.617040][ T1045] Rebooting in 86400 seconds..