8e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32=r10, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) r11 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r11, 0x1, &(0x7f0000f00f88)) msgsnd(r11, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(r11, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, r10, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r3}) msgsnd(r1, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000240)=""/243) 21:58:34 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6f040000, 0x0, 0x0, 0x0) 21:58:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) ptrace$peeksig(0x4209, r2, &(0x7f00000001c0)={0xba, 0x2, 0x7}, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}]) sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v1={0x1000000, [{0xffffff6c, 0xcd3}]}, 0xc, 0x2) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:58:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) r1 = msgget$private(0x0, 0x0) r2 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) fcntl$getownex(r2, 0x10, &(0x7f0000000580)={0x0, 0x0}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r5 = gettid() waitid(0x83b895581628fca4, r5, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r6 = memfd_create(0x0, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r8 = dup2(r7, r6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r5, r8, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r3, r4, 0x0, 0x1, &(0x7f0000000080)='\x00', r9}, 0x30) prctl$PR_CAPBSET_READ(0x17, 0xe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xb5f10c86f4c3526e) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32=r10, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) r11 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r11, 0x1, &(0x7f0000f00f88)) msgsnd(r11, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(r11, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, r10, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r3}) msgsnd(r1, &(0x7f0000000040)=ANY=[], 0x0, 0x0) 21:58:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a99b6ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x9c, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') r2 = socket$inet(0x2, 0x803, 0xa0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) setsockopt$inet_mreqsrc(r2, 0x0, 0xf, 0x0, 0x0) close(r2) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:58:35 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5c040000, 0x0, 0x0, 0x0) 21:58:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = gettid() waitid(0x83b895581628fca4, r4, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r5 = memfd_create(0x0, 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r7 = dup2(r6, r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r4, r7, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r3, 0x0, 0x1, &(0x7f0000000080)='\x00', r8}, 0x30) prctl$PR_CAPBSET_READ(0x17, 0xe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xb5f10c86f4c3526e) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32=r9, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) r10 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r10, 0x1, &(0x7f0000f00f88)) msgsnd(r10, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(r10, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, r9, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) modify_ldt$write2(0x11, &(0x7f0000000000)={0x100, 0x0, 0x4000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1}, 0x10) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:58:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a96308e1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = gettid() waitid(0x83b895581628fca4, r4, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r5 = memfd_create(0x0, 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r7 = dup2(r6, r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r4, r7, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r3, 0x0, 0x1, &(0x7f0000000080)='\x00', r8}, 0x30) prctl$PR_CAPBSET_READ(0x17, 0xe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xb5f10c86f4c3526e) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32=r9, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) r10 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r10, 0x1, &(0x7f0000f00f88)) msgsnd(r10, &(0x7f0000000040)=ANY=[], 0x0, 0x0) 21:58:35 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x70040000, 0x0, 0x0, 0x0) 21:58:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) pkey_mprotect(&(0x7f0000ff5000/0xa000)=nil, 0xa000, 0x2, 0xffffffffffffffff) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$VIDIOC_G_INPUT(r2, 0x80045626, &(0x7f0000000000)) 21:58:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a96309e1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) socket$inet6_sctp(0xa, 0x2, 0x84) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) r2 = gettid() getpgrp(r2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) 21:58:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9630ae1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:36 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5d040000, 0x0, 0x0, 0x0) 21:58:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:58:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9630de1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = gettid() waitid(0x83b895581628fca4, r4, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r5 = memfd_create(0x0, 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r7 = dup2(r6, r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r4, r7, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r3, 0x0, 0x1, &(0x7f0000000080)='\x00', r8}, 0x30) prctl$PR_CAPBSET_READ(0x17, 0xe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xb5f10c86f4c3526e) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32=r9, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) r10 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r10, 0x1, &(0x7f0000f00f88)) msgsnd(r10, &(0x7f0000000040)=ANY=[], 0x0, 0x0) 21:58:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") sendmsg$tipc(r1, &(0x7f0000000300)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x2, {0x0, 0x3, 0x1}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000140)="9a89830ae4cfb453a884ed33256a2ce505dab03dfe9df67451341cb60dde61ffb601402d2383245f4dbe6cc75ca510704453b7b21fe41c622b77cd66f4abb9f17c549fc9e7e8f673d3efe07058608979c247df6038a769db9a72994fe0c7469282e119f7554253d004bf68255b5e49c2269d1bf591a0868d8ee06cdf228b9469a57a329a6a53bb4cbc346dca523bd89b25810161e6f5527122c4c8d641564288a39071a3eb7746c85bcf51234d25f78f6866e56e40a1a8e1bc15162b6b42c13f3b", 0xc1}], 0x1, 0x0, 0x0, 0x40}, 0x200080c0) r2 = syz_open_procfs(r0, &(0x7f0000000000)='fdinfo/3\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:58:37 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x71040000, 0x0, 0x0, 0x0) 21:58:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9639be1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1082e621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) sched_setscheduler(r0, 0x5, &(0x7f00000002c0)=0x36) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x2, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="8400000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="5c0012005800010069703667726f7461700000004802f3ffff0018000000000008000100be4c4c93429e6c5beb2e67e29cefecc530edf85a691682f2e18a54cffdeee138e9df5694645b567bf632fbc857ee0f53b95de920d0de27aea74c772eeb54d4113d5e4d0b3282392d0b83afe6350526c519", @ANYRES32=0x0, @ANYBLOB="0800150000000000060010000000000008000100", @ANYRES32=0x0, @ANYBLOB="06001800000000000400120006000200000000000500080000000000"], 0x84}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000640)={0x64, r6, 0x1, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x8, 0x1, r7}, {0x48, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}]}, 0x64}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000200000000", @ANYRES32=r12, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29e81d26aa7eff367ec3e89f4a4c20de9619e37f2f84b0d398c27cbd8bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f398e6a3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@ipv4_newaddr={0x28, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r12}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x500}]}, 0x28}}, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000200000000", @ANYRES32=r16, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29e81d26aa7eff367ec3e89f4a4c20de9619e37f2f84b0d398c27cbd8bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f398e6a3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@ipv4_newaddr={0x28, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r16}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x500}]}, 0x28}}, 0x0) r17 = socket$inet(0x2, 0x803, 0xa0) connect$inet(r17, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) setsockopt$inet_mreqsrc(r17, 0x0, 0xf, 0x0, 0x0) ioctl$sock_SIOCADDRT(r17, 0x890b, &(0x7f0000002a40)={0x0, @llc={0x1a, 0x36, 0x1, 0x3, 0x3f, 0x59, @remote}, @nfc={0x27, 0x1}, @xdp={0x2c, 0x0, 0x0, 0x8}, 0x81, 0x0, 0x0, 0x0, 0x100, &(0x7f0000002a00)='caif0\x00', 0x6, 0x5, 0x5}) r19 = socket$nl_route(0x10, 0x3, 0x0) r20 = socket$netlink(0x10, 0x3, 0x0) r21 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r21, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r20, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000200000000", @ANYRES32=r22, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29e81d26aa7eff367ec3e89f4a4c20de9619e37f2f84b0d398c27cbd8bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f398e6a3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r19, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@ipv4_newaddr={0x28, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r22}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x500}]}, 0x28}}, 0x0) r23 = socket$inet(0x2, 0x803, 0xa0) connect$inet(r23, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) setsockopt$inet_mreqsrc(r23, 0x0, 0xf, 0x0, 0x0) getsockopt$inet_mreqn(r23, 0x0, 0x20, &(0x7f0000002ac0)={@initdev, @broadcast, 0x0}, &(0x7f0000002b00)=0xc) r25 = socket$inet(0x2, 0x803, 0xa0) connect$inet(r25, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) setsockopt$inet_mreqsrc(r25, 0x0, 0xf, 0x0, 0x0) r26 = socket$nl_route(0x10, 0x3, 0x0) r27 = socket$netlink(0x10, 0x3, 0x0) r28 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r28, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r28, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r27, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000200000000", @ANYRES32=r29, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29e81d26aa7eff367ec3e89f4a4c20de9619e37f2f84b0d398c27cbd8bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f398e6a3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r26, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@ipv4_newaddr={0x28, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r29}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x500}]}, 0x28}}, 0x0) ioctl$sock_SIOCADDRT(r25, 0x890b, &(0x7f0000003300)={0x0, @ipx={0x4, 0x2, 0xbc9, "41efc489ea11", 0x4}, @llc={0x1a, 0x338, 0x0, 0xff, 0x9d, 0x80, @remote}, @can={0x1d, r29}, 0x101, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000032c0)='vlan1\x00', 0x8, 0x2, 0x4}) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000003680)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80840400}, 0xc, &(0x7f0000003640)={&(0x7f0000003380)={0x29c, r6, 0x0, 0x70bd2c, 0x25dfdbfc, {}, [{{0x8, 0x1, r8}, {0xb8, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0xff}}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x140, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x5a97}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xc82a}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r22}}}]}}, {{0x8, 0x1, r24}, {0x78, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x7fff}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r30}}}]}}]}, 0x29c}, 0x1, 0x0, 0x0, 0x40010}, 0x4040) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:58:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:37 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, 0x0) 21:58:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1092e621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = gettid() waitid(0x83b895581628fca4, r4, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r5 = memfd_create(0x0, 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r7 = dup2(r6, r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r4, r7, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r3, 0x0, 0x1, &(0x7f0000000080)='\x00', r8}, 0x30) prctl$PR_CAPBSET_READ(0x17, 0xe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xb5f10c86f4c3526e) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32=r9, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) r10 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r10, 0x1, &(0x7f0000f00f88)) msgsnd(r10, &(0x7f0000000040)=ANY=[], 0x0, 0x0) 21:58:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) [ 1097.549018][T18678] team0: No ports can be present during mode change 21:58:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee10a2e621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:38 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x72040000, 0x0, 0x0, 0x0) [ 1097.817870][T18690] team0: No ports can be present during mode change 21:58:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r0, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee10d2e621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r0, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee14f2e621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:38 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, 0x0) 21:58:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x600, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r4, 0x68e0e8f2c6a4d6d3, 0x0, 0x0, {{}, {}, {0x10}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1081}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x200, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x8}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xc012}, 0x80000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:58:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = gettid() waitid(0x83b895581628fca4, r4, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r5 = memfd_create(0x0, 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r7 = dup2(r6, r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r4, r7, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r3, 0x0, 0x1, &(0x7f0000000080)='\x00', r8}, 0x30) prctl$PR_CAPBSET_READ(0x17, 0xe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xb5f10c86f4c3526e) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32=r9, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) r10 = msgget$private(0x0, 0x0) msgsnd(r10, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(r10, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, r9, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1502e621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = gettid() waitid(0x83b895581628fca4, r4, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r5 = memfd_create(0x0, 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r7 = dup2(r6, r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r4, r7, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r3, 0x0, 0x1, &(0x7f0000000080)='\x00', r8}, 0x30) prctl$PR_CAPBSET_READ(0x17, 0xe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xb5f10c86f4c3526e) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32=r9, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) r10 = msgget$private(0x0, 0x0) msgsnd(r10, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(r10, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, r9, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r0, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = gettid() waitid(0x83b895581628fca4, r4, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r5 = memfd_create(0x0, 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r7 = dup2(r6, r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r4, r7, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r3, 0x0, 0x1, &(0x7f0000000080)='\x00', r8}, 0x30) prctl$PR_CAPBSET_READ(0x17, 0xe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xb5f10c86f4c3526e) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32=r9, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) r10 = msgget$private(0x0, 0x0) msgsnd(r10, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(r10, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, r9, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:39 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x73040000, 0x0, 0x0, 0x0) 21:58:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee19b2e621b35a30b55da55b1e05e8fbf"], 0x32) [ 1099.076881][T18726] tipc: Enabling of bearer <:> rejected, illegal name 21:58:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = gettid() waitid(0x83b895581628fca4, r4, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r5 = memfd_create(0x0, 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r7 = dup2(r6, r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r4, r7, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r3, 0x0, 0x1, &(0x7f0000000080)='\x00', r8}, 0x30) prctl$PR_CAPBSET_READ(0x17, 0xe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xb5f10c86f4c3526e) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32=r9, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, r9, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x80, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x220016, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_mmap='cache=mmap'}, {@version_9p2000='version=9p2000'}, {@aname={'aname', 0x3d, '/dev/btrfs-control\x00'}}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, 'net/mcfilter\x00'}}, {@measure='measure'}, {@seclabel='seclabel'}]}}) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000002c0)) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/bsg\x00', 0xc0800, 0x0) r4 = open(&(0x7f0000000280)='./file0\x00', 0x4000, 0x2) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f0000000400)=@add_del={0x2, &(0x7f00000003c0)='macvlan0\x00'}) ioctl$PPPIOCSFLAGS(r3, 0x40047459, &(0x7f0000000200)=0x2040000) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r5, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:58:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:39 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, 0x0) 21:58:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee14108621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = gettid() waitid(0x83b895581628fca4, r4, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r5 = memfd_create(0x0, 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r7 = dup2(r6, r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r4, r7, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r3, 0x0, 0x1, &(0x7f0000000080)='\x00', r8}, 0x30) prctl$PR_CAPBSET_READ(0x17, 0xe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xb5f10c86f4c3526e) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, r9, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = gettid() waitid(0x83b895581628fca4, r4, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r5 = memfd_create(0x0, 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r7 = dup2(r6, r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r4, r7, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r3, 0x0, 0x1, &(0x7f0000000080)='\x00', r8}, 0x30) prctl$PR_CAPBSET_READ(0x17, 0xe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xb5f10c86f4c3526e) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, r9, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee14109621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = gettid() waitid(0x83b895581628fca4, r4, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r5 = memfd_create(0x0, 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r7 = dup2(r6, r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r4, r7, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r3, 0x0, 0x1, &(0x7f0000000080)='\x00', r8}, 0x30) prctl$PR_CAPBSET_READ(0x17, 0xe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xb5f10c86f4c3526e) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, r9, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:40 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, 0x0) 21:58:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1410a621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = gettid() waitid(0x83b895581628fca4, r4, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r5 = memfd_create(0x0, 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r7 = dup2(r6, r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r4, r7, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r3, 0x0, 0x1, &(0x7f0000000080)='\x00', r8}, 0x30) prctl$PR_CAPBSET_READ(0x17, 0xe) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000280)={0xffff}, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) r3 = socket(0x10, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(r3, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r4, 0x267c50ef3d91d5f2, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @rand_addr="866379f318228b325c77edb785c080a9"}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x2c}}]}, 0x30}, 0x1, 0x0, 0x0, 0x2008800}, 0x4010) 21:58:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:40 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, 0x0) 21:58:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x4, 0x81) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1600000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r3, 0x400, 0x200, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x44}}, 0x40000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:58:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = gettid() waitid(0x83b895581628fca4, r4, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r5 = memfd_create(0x0, 0x0) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r7 = dup2(r6, r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r4, r7, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r3, 0x0, 0x1, &(0x7f0000000080)='\x00', r8}, 0x30) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1410d621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r3 = gettid() waitid(0x83b895581628fca4, r3, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r4 = memfd_create(0x0, 0x0) r5 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r6 = dup2(r5, r4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r3, r6, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r7}, 0x30) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)={0x0, 0x0}) move_pages(r2, 0x6, &(0x7f0000000200)=[&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil], &(0x7f0000000280), &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:58:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:41 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x74040000, 0x0, 0x0, 0x0) 21:58:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee14132621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r3 = gettid() waitid(0x83b895581628fca4, r3, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r4 = memfd_create(0x0, 0x0) r5 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r6 = dup2(r5, r4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r3, r6, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r7}, 0x30) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r3 = gettid() waitid(0x83b895581628fca4, r3, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r4 = memfd_create(0x0, 0x0) r5 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) dup2(r5, r4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:42 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, 0x0) 21:58:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee14150621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r3 = gettid() waitid(0x83b895581628fca4, r3, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r4 = memfd_create(0x0, 0x0) r5 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) dup2(r5, r4) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1419b621b35a30b55da55b1e05e8fbf"], 0x32) 21:58:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r3 = gettid() waitid(0x83b895581628fca4, r3, &(0x7f0000000040), 0x2, &(0x7f0000000480)) memfd_create(0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:42 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x75040000, 0x0, 0x0, 0x0) 21:58:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r3 = gettid() waitid(0x83b895581628fca4, r3, &(0x7f0000000040), 0x2, &(0x7f0000000480)) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e081b35a30b55da55b1e05e8fbf"], 0x32) 21:58:43 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa0006000, 0x0, 0x0, 0x0) 21:58:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r3 = gettid() waitid(0x83b895581628fca4, r3, &(0x7f0000000040), 0x2, &(0x7f0000000480)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) gettid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e091b35a30b55da55b1e05e8fbf"], 0x32) 21:58:43 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, 0x0) 21:58:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r2}) 21:58:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e0a1b35a30b55da55b1e05e8fbf"], 0x32) 21:58:44 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, 0x0) 21:58:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) socket$kcm(0x11, 0xa, 0x300) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:44 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, 0x0) 21:58:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e0d1b35a30b55da55b1e05e8fbf"], 0x32) 21:58:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) msgget$private(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e9b1b35a30b55da55b1e05e8fbf"], 0x32) 21:58:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:45 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf2f52010, 0x0, 0x0, 0x0) 21:58:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x24) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:46 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa0006000, 0x0, 0x0, 0x0) 21:58:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e620735a30b55da55b1e05e8fbf"], 0x32) 21:58:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:46 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e620835a30b55da55b1e05e8fbf"], 0x32) 21:58:46 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:46 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf5ffffff, 0x0, 0x0, 0x0) 21:58:46 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:46 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:47 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:47 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, 0x0) 21:58:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e620935a30b55da55b1e05e8fbf"], 0x32) 21:58:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:47 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:47 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e620a35a30b55da55b1e05e8fbf"], 0x32) 21:58:47 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:47 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, 0x0) 21:58:48 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e620c35a30b55da55b1e05e8fbf"], 0x32) 21:58:48 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:48 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf2f52010, 0x0, 0x0, 0x0) 21:58:48 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:48 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) 21:58:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e620d35a30b55da55b1e05e8fbf"], 0x32) 21:58:48 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf8250000, 0x0, 0x0, 0x0) 21:58:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e620e35a30b55da55b1e05e8fbf"], 0x32) 21:58:49 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf5ffffff, 0x0, 0x0, 0x0) 21:58:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000240)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x44, r2, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x4}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x722335f8e4996199}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r2, 0x8, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x20000080) r3 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r3}, 0x0) r4 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) sched_setscheduler(r4, 0x3, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r5, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) ioctl$SNDRV_PCM_IOCTL_REWIND(r5, 0x40084146, &(0x7f0000000000)=0x3) 21:58:49 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) 21:58:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e620f35a30b55da55b1e05e8fbf"], 0x32) 21:58:50 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf9fdffff, 0x0, 0x0, 0x0) 21:58:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:50 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, 0x0) 21:58:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621835a30b55da55b1e05e8fbf"], 0x32) 21:58:50 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) 21:58:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000380)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r3, 0x8d3d3b2ee8458b58, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x400}, 0x4008000) sendmsg$NET_DM_CMD_START(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x14, r3, 0x200, 0x70bd27, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0xd9b13b483cfd6243}, 0x18000) 21:58:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621a35a30b55da55b1e05e8fbf"], 0x32) 21:58:51 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfbffffff, 0x0, 0x0, 0x0) 21:58:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, 0x0, 0x0) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621e35a30b55da55b1e05e8fbf"], 0x32) 21:58:51 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf9fdffff, 0x0, 0x0, 0x0) 21:58:51 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:51 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{}, 0x0, 0x0, 0x0, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, 0x0, 0x0) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = socket$inet(0x2, 0x803, 0xa0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) setsockopt$inet_mreqsrc(r1, 0x0, 0xf, 0x0, 0x0) getsockname$l2tp(r1, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10) sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:58:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e623235a30b55da55b1e05e8fbf"], 0x32) 21:58:52 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c}) 21:58:52 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xff000000, 0x0, 0x0, 0x0) 21:58:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000000)=0x0) ptrace$setregset(0x4205, r3, 0x4, &(0x7f0000000040)={&(0x7f0000000180)="89dd6f1d02af0cad68455bf63885a4f7649cf4d8d05decfe2ef4ccd9e06f393ea809e17bcaf7e2bb7038dc03c64a0c9cb93f4f4cc4cc6556427a4b1a95fae73ef83c57ad1c56782b4b55fe687594c7ede6308c8ab45c46964be08179a9a0b0ad8055d7214f43e4065db7941ed973591c874144f45170a6854a4b925c7185c575b193728e4e209c9c7a0bd17985ee2c608a2cfbf1c510dbf279f9ad7989f1f4ace4e65e92e2b9be1bb98a58894f82", 0xae}) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xc200, 0x0) 21:58:52 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x7c}) 21:58:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e625035a30b55da55b1e05e8fbf"], 0x32) 21:58:52 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c}) 21:58:52 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfbffffff, 0x0, 0x0, 0x0) 21:58:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, 0x0, 0x0) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0xa, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:58:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e629b35a30b55da55b1e05e8fbf"], 0x32) 21:58:52 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:58:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0x0) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b07a30b55da55b1e05e8fbf"], 0x32) 21:58:53 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xff0f0000, 0x0, 0x0, 0x0) 21:58:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/btrfs-control\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:58:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0x0) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101000, 0x0) 21:58:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b08a30b55da55b1e05e8fbf"], 0x32) 21:58:53 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xff000000, 0x0, 0x0, 0x0) 21:58:53 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:58:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0x0) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b09a30b55da55b1e05e8fbf"], 0x32) 21:58:54 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffefffff, 0x0, 0x0, 0x0) 21:58:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b0aa30b55da55b1e05e8fbf"], 0x32) 21:58:54 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:58:55 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xff0f0000, 0x0, 0x0, 0x0) 21:58:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b0ca30b55da55b1e05e8fbf"], 0x32) 21:58:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:55 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffefff, 0x0, 0x0, 0x0) 21:58:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b0da30b55da55b1e05e8fbf"], 0x32) 21:58:55 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:58:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000"], 0x9) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:56 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffefffff, 0x0, 0x0, 0x0) 21:58:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b0ea30b55da55b1e05e8fbf"], 0x32) 21:58:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000"], 0x9) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:56 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffdf9, 0x0, 0x0, 0x0) 21:58:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b0fa30b55da55b1e05e8fbf"], 0x32) 21:58:56 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:58:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000"], 0x9) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b18a30b55da55b1e05e8fbf"], 0x32) 21:58:57 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffefff, 0x0, 0x0, 0x0) 21:58:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b000000000000000000"], 0xd) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:57 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:58:57 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, 0x0) 21:58:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b1aa30b55da55b1e05e8fbf"], 0x32) 21:58:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b000000000000000000"], 0xd) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b1ba30b55da55b1e05e8fbf"], 0x32) 21:58:58 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffdf9, 0x0, 0x0, 0x0) 21:58:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b000000000000000000"], 0xd) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:58 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:58:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b23a30b55da55b1e05e8fbf"], 0x32) 21:58:58 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:58:58 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, 0x0) 21:58:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b00"/15], 0xf) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:59 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:58:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b25a30b55da55b1e05e8fbf"], 0x32) 21:58:59 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:58:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b00"/15], 0xf) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:58:59 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, 0x0) 21:58:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b28a30b55da55b1e05e8fbf"], 0x32) 21:59:00 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff5, 0x0, 0x0, 0x0) 21:59:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b00"/15], 0xf) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b29a30b55da55b1e05e8fbf"], 0x32) 21:59:00 executing program 4: msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:59:00 executing program 4: msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:59:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b00"/16], 0x10) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:00 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, 0x0) 21:59:00 executing program 4: msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:59:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b37a30b55da55b1e05e8fbf"], 0x32) 21:59:01 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:59:01 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, 0x0) 21:59:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b00"/16], 0x10) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b38a30b55da55b1e05e8fbf"], 0x32) 21:59:01 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:59:01 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:59:02 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff5, 0x0, 0x0, 0x0) 21:59:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b00"/16], 0x10) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:02 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:59:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b3da30b55da55b1e05e8fbf"], 0x32) 21:59:02 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:59:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = timerfd_create(0x9, 0x0) timerfd_settime(r1, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x989680}}, 0x0) read(r1, &(0x7f0000a16000)=""/71, 0x47) timerfd_settime(r1, 0x3, 0xfffffffffffffffe, &(0x7f0000000440)) r2 = syz_open_procfs(0x0, &(0x7f0000000480)='statm\x00') preadv(r2, &(0x7f0000000600)=[{&(0x7f0000000580)=""/98}, {&(0x7f0000001640)=""/240}], 0x4cee90dcec7051f, 0xfffffffffffffffd) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r4, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f0000000000)={0x0, 0x0, 0x8000}) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000040)={r5}) socket$inet(0x2b, 0x801, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="d8fd7340180ef49bcd703e3bc820b0619034a0437d8ceaf500d9778d7c5d1c1ce864ae3433a6c6784114feed4030c4cd811e0119198793643056ab7b7951e73ecdfda18f000000005ef06f875382cafd6d9e36d09059c14426"], 0x11) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r7, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) ioctl$TIOCL_PASTESEL(r7, 0x541c, &(0x7f0000000140)) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) init_module(&(0x7f0000000200)='net/mcfilter\x00', 0xd, &(0x7f0000000280)='/dev/btrfs-control\x00') r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r8, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r8, 0x84, 0x7, &(0x7f0000000540)={0xffffffc1}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0xff) ioctl$TIOCMGET(r6, 0x5415, &(0x7f0000000180)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:59:02 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) 21:59:02 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffb, 0x0, 0x0, 0x0) 21:59:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:02 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) 21:59:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b3ea30b55da55b1e05e8fbf"], 0x32) 21:59:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000000)={0x0, 0x7, 0x4, 0x1, 0x9, {0x0, 0x2710}, {0x1, 0x0, 0x8, 0x0, 0x3, 0xf4, "8dc7261b"}, 0x6, 0x1, @offset=0x20, 0x5, 0x0, 0xffffffffffffffff}) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000180)=0x66, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:59:03 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, 0x0) 21:59:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b44a30b55da55b1e05e8fbf"], 0x32) 21:59:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b45a30b55da55b1e05e8fbf"], 0x32) 21:59:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4da2b86141b4d928, 0x0) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0', [{0x20, 'net/mcfilter\x00'}, {0x20, '/dev/btrfs-control\x00'}], 0xa, "9c3c4f3c9ad4cc4ea92ac3f4af2d68cb532d8b64517e6b4f2ae92671befc2a59dd853bd52c094db66580a4025d16e93593167968653023e98590f7c145b73ba16fa42ee4de7eba1e049df69a315ec9a0d6946034ed1ae12cb82a1e2587765b48f29949b0d52105e04595fe22668e75e94d5e76b72babc10e3f48b640d40d7dc818b1f1ef5ca5f52fbae6f53140f54d97e4318ab713e24ffb46a7a4f92058"}, 0xcb) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:59:03 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) 21:59:03 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, 0x0) 21:59:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000000)=""/63, &(0x7f0000000040)=0x3f) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:59:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b48a30b55da55b1e05e8fbf"], 0x32) 21:59:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = socket$bt_rfcomm(0x1f, 0x3, 0x3) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000000)=0x6, 0x4) sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:59:04 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffb, 0x0, 0x0, 0x0) 21:59:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x1) r2 = gettid() waitid(0x83b895581628fca4, r2, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r3 = memfd_create(0x0, 0x0) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r5 = dup2(r4, r3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r2, r5, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r6}, 0x30) sched_setscheduler(r2, 0x1, &(0x7f0000000000)=0x8) r7 = socket$pppl2tp(0x18, 0x1, 0x1) recvmmsg(r7, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0xff2a, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x141, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r8, &(0x7f0000000480), 0x10000000000002a1, 0x0) write$FUSE_POLL(r8, &(0x7f0000000180)={0x18, 0x0, 0x2}, 0x18) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:59:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b4da30b55da55b1e05e8fbf"], 0x32) 21:59:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000000000)={0x7, 'veth0_to_bridge\x00', {0x10000}, 0x6}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, 0xffffffffffffffff) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:59:04 executing program 4: fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) 21:59:04 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, 0x0) 21:59:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xfffffffffffff53a, 0x880) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r4, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000180)={0x0, 0x0}) getpgid(r5) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:59:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b50a30b55da55b1e05e8fbf"], 0x32) 21:59:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) r2 = socket$inet(0x2, 0x803, 0xa0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) setsockopt$inet_mreqsrc(r2, 0x0, 0xf, 0x0, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x11, &(0x7f0000000040)={@dev, @dev, 0x0}, &(0x7f0000000180)=0xc) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x400000, 0x0) ioctl$RTC_VL_CLR(r4, 0x7014) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="4d7922c9e810a31fea6f071ae6e8e259ebf48c30fa4c3572a9d3f3425cae906d121ec96c889ce8b33ba460fc97", 0x2d, 0x4000, &(0x7f00000001c0)={0x11, 0x0, r3, 0x1, 0x7f, 0x6, @local}, 0x14) 21:59:05 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, 0x0) 21:59:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b5aa30b55da55b1e05e8fbf"], 0x32) 21:59:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x71184dc09424f0be, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000040)={0xa, [0x6, 0x3, 0x5, 0xc8, 0x7, 0x7ff, 0x1, 0x1, 0x9, 0x8]}, 0x18) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:59:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b00"/15], 0xf) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0xa2a8c243fbcc9ec, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000180)=0x8000, 0x8) sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x8011, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$TIOCGRS485(r2, 0x542e, &(0x7f0000000000)) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:59:06 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7ffffffffffff, 0x0, 0x0, 0x0) 21:59:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x0, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b5ba30b55da55b1e05e8fbf"], 0x32) 21:59:06 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, 0x0) 21:59:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000"], 0x9) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b5da30b55da55b1e05e8fbf"], 0x32) 21:59:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x0, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b63a30b55da55b1e05e8fbf"], 0x32) 21:59:07 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6000a0ffffffff, 0x0, 0x0, 0x0) 21:59:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b9ba30b55da55b1e05e8fbf"], 0x32) 21:59:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x0, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:07 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7ffffffffffff, 0x0, 0x0, 0x0) 21:59:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30755da55b1e05e8fbf"], 0x32) 21:59:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x0, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30855da55b1e05e8fbf"], 0x32) 21:59:08 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 21:59:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r0, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30955da55b1e05e8fbf"], 0x32) 21:59:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x0, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:08 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6000a0ffffffff, 0x0, 0x0, 0x0) 21:59:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30a55da55b1e05e8fbf"], 0x32) 21:59:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x24) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/160) r1 = msgget$private(0x0, 0x0) r2 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) fcntl$getownex(r2, 0x10, &(0x7f0000000580)={0x0, 0x0}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r5 = gettid() waitid(0x83b895581628fca4, r5, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r6 = memfd_create(0x0, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r8 = dup2(r7, r6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r5, r8, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r3, r4, 0x0, 0x1, &(0x7f0000000080)='\x00', r9}, 0x30) prctl$PR_CAPBSET_READ(0x17, 0xe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xb5f10c86f4c3526e) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010002000000000002000400fa0e7dbf865192dc63ec8e294b90ce97b74a60d769ee5c39c59bc8d006a858e5b99d648f2481b4ea4f17cbc2", @ANYRES32, @ANYBLOB="1f70a76423fcf6c60b5a5b003bfbf690717cce1f5f05be47badef20806f31295410c76d9de513b4920f43eb40e1b62984eeaf42410c30e4cd6909e26e131a8f8595ad5f0f4fb4546c9fe704037b6964c5d7afb170cc936c756799177a829e7882cefa82dc2c9bf1d", @ANYRES32=r10, @ANYBLOB="5604cd1426155d63d7756d98b133e8b3d7a95f8c2c33241bf9c27ea8caf33a6fd2f40a9995abe1afafbabb6044b92943a3", @ANYRES32, @ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="3a3d3c3ec3d203c54ae2eac5c6a6415651ac0bed439bf4807bc70ec7dd4ef28df5b3ba3b40e14b85dd04c554d2e2c189f80fdd57fed5e7593f238805c8127a3d501db129591f000956e742048ce959bd59f17e80ca046a9e9486d66aa3f90815ac5ebafff674bd20c40bb899ddc320622d6af4b629d26f16cce5dda5c05c6e98ae5e534639e07c833291f6fd848d1d46322d4258046826505ff39c6e2daff216e78a1374", @ANYBLOB="f2ff", @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB='\b\x00', @ANYPTR64, @ANYRES32, @ANYBLOB="10002500000000002042"], 0x15, 0x0) r11 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r11, 0x1, &(0x7f0000f00f88)) msgsnd(r11, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$IPC_SET(r11, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, r10, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffbc, 0x0, 0x0, 0xfad7, 0x0, 0xfffd, 0x7c, r3}) msgsnd(r1, &(0x7f0000000040)=ANY=[], 0x0, 0x0) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000240)=""/243) r12 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r12, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0800000000000000000000006d9ed977e30c"], 0x16) 21:59:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x0, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30c55da55b1e05e8fbf"], 0x32) 21:59:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:09 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x126000000000000, 0x0, 0x0, 0x0) 21:59:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0x0, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:09 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 21:59:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30d55da55b1e05e8fbf"], 0x32) 21:59:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30e55da55b1e05e8fbf"], 0x32) 21:59:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0x0, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:10 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x148000000000000, 0x0, 0x0, 0x0) 21:59:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30f55da55b1e05e8fbf"], 0x32) 21:59:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0800000000000000000000006d9ed977e30c"], 0x16) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) ioctl$VT_WAITACTIVE(r1, 0x5607) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)={0x401, 0x0, 0x8, 0x1, 0x4, "9800bbefbf8520ca"}) 21:59:10 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, 0x0) 21:59:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0x0, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0800000000000000000000006d9ed977e30c"], 0x16) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) ioctl$VT_WAITACTIVE(r1, 0x5607) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)={0x401, 0x0, 0x8, 0x1, 0x4, "9800bbefbf8520ca"}) 21:59:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a31055da55b1e05e8fbf"], 0x32) 21:59:11 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000440)='/dev/audio#\x00', 0xdc, 0x2111c0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000480)=0x7fff, &(0x7f00000004c0)=0x4) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/144, 0x90}, {&(0x7f0000000240)=""/235, 0xeb}, {&(0x7f0000000000)=""/52, 0x34}, {&(0x7f0000000340)=""/245, 0xf5}, {&(0x7f0000000a80)=""/198, 0xc6}], 0x5) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000580)=""/228, 0xe4}, {&(0x7f0000000680)=""/11, 0xb}, {&(0x7f00000006c0)=""/75, 0x4b}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000840)=""/170, 0xaa}], 0x5, &(0x7f0000000980)=""/190, 0xbe}, 0x18000) setsockopt$ALG_SET_AEAD_AUTHSIZE(r3, 0x117, 0x5, 0x0, 0x1000) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b08000000cb370000000000006d9ed977e30c"], 0x16) 21:59:11 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, 0x0) 21:59:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x0, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0x0, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a31855da55b1e05e8fbf"], 0x32) 21:59:12 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x226000000000000, 0x0, 0x0, 0x0) 21:59:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x0, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a31a55da55b1e05e8fbf"], 0x32) 21:59:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x0, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a31b55da55b1e05e8fbf"], 0x32) 21:59:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x0, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:12 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x280800000000000, 0x0, 0x0, 0x0) 21:59:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a31e55da55b1e05e8fbf"], 0x32) 21:59:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x0, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:13 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, 0x0) 21:59:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, 0x0}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a33255da55b1e05e8fbf"], 0x32) 21:59:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r3, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r4}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r4, 0x4, 0x18}, 0xc) 21:59:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a35055da55b1e05e8fbf"], 0x32) 21:59:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, 0x0}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:14 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, 0x0) 21:59:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a39b55da55b1e05e8fbf"], 0x32) 21:59:14 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, 0x0) 21:59:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, 0x0}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b08da55b1e05e8fbf"], 0x32) 21:59:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, 0x0}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b09da55b1e05e8fbf"], 0x32) 21:59:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, 0x0}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b0ada55b1e05e8fbf"], 0x32) 21:59:15 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, 0x0) 21:59:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:15 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x426000000000000, 0x0, 0x0, 0x0) 21:59:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b0dda55b1e05e8fbf"], 0x32) 21:59:15 executing program 4: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) fcntl$getownex(r4, 0x10, &(0x7f0000000580)={0x0, 0x0}) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000001640)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r7, @ANYRESHEX, @ANYRES16=r8], @ANYRES32, @ANYRES32, @ANYBLOB="a0445884b5301b38961914e883403abb23e61dd4c5e95f6026fdd038f0de", @ANYRES32=0x0, @ANYRESHEX=r1], 0x6, 0x1) waitid(0x1, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r9 = memfd_create(0x0, 0x0) r10 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r11 = dup2(r10, r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x3, 0x0, 0xffff}, &(0x7f00000005c0)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x68) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={0x0, r11, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r5, r6, 0x0, 0x1, &(0x7f0000000080)='\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r3, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r12}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r13, r2, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r1, r0, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r12}, 0x30) r14 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x101, 0x0) ioctl$DRM_IOCTL_VERSION(r14, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r14, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0xffc1}, r15, 0x0, 0xffffffffffffffff, 0x0) r16 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r16, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0800000000000000000000006d9ed977e30c"], 0x16) 21:59:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da08b1e05e8fbf"], 0x32) 21:59:16 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, 0x0) 21:59:16 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, 0x0) 21:59:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da09b1e05e8fbf"], 0x32) 21:59:16 executing program 4: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) fcntl$getownex(r4, 0x10, &(0x7f0000000580)={0x0, 0x0}) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000001640)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r7, @ANYRESHEX, @ANYRES16=r8], @ANYRES32, @ANYRES32, @ANYBLOB="a0445884b5301b38961914e883403abb23e61dd4c5e95f6026fdd038f0de", @ANYRES32=0x0, @ANYRESHEX=r1], 0x6, 0x1) waitid(0x1, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r9 = memfd_create(0x0, 0x0) r10 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r11 = dup2(r10, r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x3, 0x0, 0xffff}, &(0x7f00000005c0)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x68) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={0x0, r11, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r5, r6, 0x0, 0x1, &(0x7f0000000080)='\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r3, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r12}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r13, r2, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r1, r0, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r12}, 0x30) r14 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x101, 0x0) ioctl$DRM_IOCTL_VERSION(r14, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r14, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x1, 0x7, 0x8, 0xffc1}, r15, 0x0, 0xffffffffffffffff, 0x0) r16 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r16, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0800000000000000000000006d9ed977e30c"], 0x16) 21:59:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da0ab1e05e8fbf"], 0x32) 21:59:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:17 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, 0x0) 21:59:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:17 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, 0x0) 21:59:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da0db1e05e8fbf"], 0x32) 21:59:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e0088fbf"], 0x32) 21:59:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e0098fbf"], 0x32) 21:59:18 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, 0x0) 21:59:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r3, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r4}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r4, 0x4, 0x18}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r4, 0x1, 0x4}, 0xc) 21:59:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e00a8fbf"], 0x32) 21:59:18 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, 0x0) 21:59:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e00d8fbf"], 0x32) 21:59:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:19 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x0, 0x0) 21:59:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x2) 21:59:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x3) 21:59:20 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x0, 0x0) 21:59:20 executing program 4: r0 = getpid() r1 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r1, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = dup(0xffffffffffffffff) setsockopt$packet_int(r6, 0x107, 0x10000000000f, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x5452, &(0x7f0000000040)) fcntl$getownex(r8, 0x10, &(0x7f0000000580)={0x0, 0x0}) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r11, &(0x7f0000000140)=ANY=[], 0xfef0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r12, r12) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r11, @ANYRESHEX, @ANYRES16=r12], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r5], 0x6, 0x1) r13 = gettid() waitid(0x83b895581628fca4, r13, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r14 = memfd_create(0x0, 0x0) r15 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r16 = dup2(r15, r14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r13, r16, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r9, r10, 0x0, 0x1, &(0x7f0000000080)='\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r7, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r17}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r18, r6, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, r4, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r3, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r17}, 0x30) r19 = getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r19, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r17}, 0x30) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}, 0x5186165c3a9ef62f}, r0, 0x5, 0xffffffffffffffff, 0x0) r20 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r20, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x4) 21:59:20 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x0, 0x0) 21:59:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x5) 21:59:20 executing program 4: r0 = getpid() r1 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r1, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = dup(0xffffffffffffffff) setsockopt$packet_int(r6, 0x107, 0x10000000000f, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x5452, &(0x7f0000000040)) fcntl$getownex(r8, 0x10, &(0x7f0000000580)={0x0, 0x0}) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r11, &(0x7f0000000140)=ANY=[], 0xfef0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r12, r12) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r11, @ANYRESHEX, @ANYRES16=r12], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r5], 0x6, 0x1) r13 = gettid() waitid(0x83b895581628fca4, r13, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r14 = memfd_create(0x0, 0x0) r15 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r16 = dup2(r15, r14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r13, r16, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r9, r10, 0x0, 0x1, &(0x7f0000000080)='\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r7, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r17}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r18, r6, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, r4, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r3, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r17}, 0x30) r19 = getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r19, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r17}, 0x30) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}, 0x5186165c3a9ef62f}, r0, 0x5, 0xffffffffffffffff, 0x0) r20 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r20, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x6) 21:59:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:21 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x0, 0x0) 21:59:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x7) 21:59:21 executing program 4: r0 = getpid() r1 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r1, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = dup(0xffffffffffffffff) setsockopt$packet_int(r6, 0x107, 0x10000000000f, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x5452, &(0x7f0000000040)) fcntl$getownex(r8, 0x10, &(0x7f0000000580)={0x0, 0x0}) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r11, &(0x7f0000000140)=ANY=[], 0xfef0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r12, r12) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r11, @ANYRESHEX, @ANYRES16=r12], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r5], 0x6, 0x1) r13 = gettid() waitid(0x83b895581628fca4, r13, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r14 = memfd_create(0x0, 0x0) r15 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r16 = dup2(r15, r14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r13, r16, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r9, r10, 0x0, 0x1, &(0x7f0000000080)='\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r7, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r17}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r18, r6, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, r4, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r3, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r17}, 0x30) r19 = getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r19, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r17}, 0x30) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}, 0x5186165c3a9ef62f}, r0, 0x5, 0xffffffffffffffff, 0x0) r20 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r20, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x8) 21:59:21 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, 0x0) 21:59:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x9) 21:59:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0xa) 21:59:22 executing program 4: r0 = getpid() r1 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r1, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = dup(0xffffffffffffffff) setsockopt$packet_int(r6, 0x107, 0x10000000000f, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x5452, &(0x7f0000000040)) fcntl$getownex(r8, 0x10, &(0x7f0000000580)={0x0, 0x0}) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r11, &(0x7f0000000140)=ANY=[], 0xfef0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r12, r12) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r11, @ANYRESHEX, @ANYRES16=r12], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r5], 0x6, 0x1) r13 = gettid() waitid(0x83b895581628fca4, r13, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r14 = memfd_create(0x0, 0x0) r15 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r16 = dup2(r15, r14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r13, r16, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r9, r10, 0x0, 0x1, &(0x7f0000000080)='\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r7, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r17}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r18, r6, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, r4, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r3, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r17}, 0x30) r19 = getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r19, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r17}, 0x30) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}, 0x5186165c3a9ef62f}, r0, 0x5, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:22 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, 0x0) 21:59:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0xb) 21:59:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:22 executing program 4: r0 = getpid() r1 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r1, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = dup(0xffffffffffffffff) setsockopt$packet_int(r6, 0x107, 0x10000000000f, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x5452, &(0x7f0000000040)) fcntl$getownex(r8, 0x10, &(0x7f0000000580)={0x0, 0x0}) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r11, &(0x7f0000000140)=ANY=[], 0xfef0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r12, r12) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r11, @ANYRESHEX, @ANYRES16=r12], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r5], 0x6, 0x1) r13 = gettid() waitid(0x83b895581628fca4, r13, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r14 = memfd_create(0x0, 0x0) r15 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r16 = dup2(r15, r14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r13, r16, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r9, r10, 0x0, 0x1, &(0x7f0000000080)='\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r7, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r17}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r18, r6, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, r4, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r3, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r17}, 0x30) r19 = getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r19, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r17}, 0x30) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}, 0x5186165c3a9ef62f}, r0, 0x5, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0xc) 21:59:22 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x0, 0x0) 21:59:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x0, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0xd) 21:59:23 executing program 4: r0 = getpid() r1 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r1, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = dup(0xffffffffffffffff) setsockopt$packet_int(r6, 0x107, 0x10000000000f, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x5452, &(0x7f0000000040)) fcntl$getownex(r8, 0x10, &(0x7f0000000580)={0x0, 0x0}) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r11, &(0x7f0000000140)=ANY=[], 0xfef0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r12, r12) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r11, @ANYRESHEX, @ANYRES16=r12], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r5], 0x6, 0x1) r13 = gettid() waitid(0x83b895581628fca4, r13, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r14 = memfd_create(0x0, 0x0) r15 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r16 = dup2(r15, r14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r13, r16, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r9, r10, 0x0, 0x1, &(0x7f0000000080)='\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r7, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r17}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r18, r6, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, r4, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r3, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r17}, 0x30) r19 = getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r19, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r17}, 0x30) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}, 0x5186165c3a9ef62f}, r0, 0x5, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:23 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x0, 0x0) 21:59:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x0, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0xe) 21:59:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0xf) 21:59:24 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) setsockopt$packet_int(r5, 0x107, 0x10000000000f, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000140)=ANY=[], 0xfef0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r10, @ANYRESHEX, @ANYRES16=r11], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r4], 0x6, 0x1) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = memfd_create(0x0, 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r15 = dup2(r14, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r5, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r16}, 0x30) r18 = getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r18, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) r19 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r19, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:24 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x0, 0x0) 21:59:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x0, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x10) 21:59:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x11) 21:59:24 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x0, 0x0) 21:59:24 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r1, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r15}, 0x30) getpgid(0xffffffffffffffff) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x12) 21:59:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x0, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:25 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1020f5f200000000, 0x0, 0x0, 0x0) 21:59:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x13) 21:59:25 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r1, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r15}, 0x30) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x14) 21:59:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x0, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:25 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1020f5f200000000, 0x0, 0x0, 0x0) 21:59:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x15) 21:59:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000000)={0xd5f, 0x0, 0x10000, 0x90}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000040)={0x7ff, r2}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:59:25 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2, 0x20000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="43000000e093434e474eabd2771f78910d94a2fa95ead08177c18bfdddd655c6f84d6dc803d5acd779ed4eba3b5a8097c30ff40bdf10089043ecb84c41938e38dc3cf5ce53e881c93c9e075fb1c1f804c29e7673da3c"], &(0x7f0000000040)=0x4b) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000300)={r3, @in6={{0xa, 0x4e20, 0x2, @ipv4={[], [], @broadcast}, 0x9}}, [0x4f11c2a, 0x1f, 0x9, 0x101, 0x9, 0x101, 0x5, 0x4, 0x7, 0x4, 0xe71, 0x37, 0x6, 0x3ff, 0x5]}, &(0x7f0000000200)=0x100) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:59:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x16) 21:59:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x0, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:26 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) 21:59:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x17) 21:59:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x10, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x41c1, 0x54ac3ebb0db5cf6b, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf63f, 0x80d}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:59:26 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) 21:59:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x0, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:26 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000180)=0x6e) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/136, 0x88}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet(0x2b, 0x801, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xb00, 0x0) 21:59:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x18) 21:59:27 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x0, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:27 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, 0x0) 21:59:27 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x19) 21:59:28 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, 0x0) 21:59:28 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x0, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x1a) 21:59:28 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2300000000000000, 0x0, 0x0, 0x0) 21:59:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x1b) 21:59:28 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0x0, 0x0, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x0, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x1c) 21:59:29 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2300000000000000, 0x0, 0x0, 0x0) 21:59:29 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0x0, 0x0, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x1d) 21:59:29 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2804000000000000, 0x0, 0x0, 0x0) 21:59:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x0, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x1e) 21:59:29 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0x0, 0x0, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x21) 21:59:30 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2804000000000000, 0x0, 0x0, 0x0) 21:59:30 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r1, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r15}, 0x30) getpgid(0xffffffffffffffff) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x22) 21:59:30 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) 21:59:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x0, 0x0, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x23) 21:59:31 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = dup(0xffffffffffffffff) setsockopt$packet_int(r3, 0x107, 0x10000000000f, 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)={0x0, 0x0}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r8, &(0x7f0000000140)=ANY=[], 0xfef0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r9, r9) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r8, @ANYRESHEX, @ANYRES16=r9], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r2], 0x6, 0x1) r10 = gettid() waitid(0x83b895581628fca4, r10, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r11 = memfd_create(0x0, 0x0) r12 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r13 = dup2(r12, r11) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r10, r13, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r6, r7, 0x0, 0x1, &(0x7f0000000080)='\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r4, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r14}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r14}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r15, r3, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r14}, 0x30) r16 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r16, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:31 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r1, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r15}, 0x30) getpgid(0xffffffffffffffff) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:31 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) 21:59:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x0, 0x0, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x24) 21:59:31 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) 21:59:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x0, 0x0, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x25) 21:59:32 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = dup(0xffffffffffffffff) setsockopt$packet_int(r3, 0x107, 0x10000000000f, 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)={0x0, 0x0}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r8, &(0x7f0000000140)=ANY=[], 0xfef0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r9, r9) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r8, @ANYRESHEX, @ANYRES16=r9], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r2], 0x6, 0x1) r10 = gettid() waitid(0x83b895581628fca4, r10, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r11 = memfd_create(0x0, 0x0) r12 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r13 = dup2(r12, r11) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r10, r13, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r6, r7, 0x0, 0x1, &(0x7f0000000080)='\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r4, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r14}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r14}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r15, r3, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r14}, 0x30) r16 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r16, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x0, 0x0, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:32 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) 21:59:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x26) 21:59:32 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) setsockopt$packet_int(r5, 0x107, 0x10000000000f, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000140)=ANY=[], 0xfef0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r10, @ANYRESHEX, @ANYRES16=r11], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r4], 0x6, 0x1) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = memfd_create(0x0, 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r15 = dup2(r14, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r5, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r16}, 0x30) r18 = getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r18, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) r19 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r19, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:32 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = dup(0xffffffffffffffff) setsockopt$packet_int(r3, 0x107, 0x10000000000f, 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)={0x0, 0x0}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r8, &(0x7f0000000140)=ANY=[], 0xfef0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r9, r9) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r8, @ANYRESHEX, @ANYRES16=r9], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r2], 0x6, 0x1) r10 = gettid() waitid(0x83b895581628fca4, r10, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r11 = memfd_create(0x0, 0x0) r12 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r13 = dup2(r12, r11) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r10, r13, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r6, r7, 0x0, 0x1, &(0x7f0000000080)='\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r4, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r14}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r14}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r15, r3, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r14}, 0x30) r16 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r16, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:32 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x0, 0x0) 21:59:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x0, 0x0}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x27) 21:59:33 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) setsockopt$packet_int(r5, 0x107, 0x10000000000f, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000140)=ANY=[], 0xfef0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r10, @ANYRESHEX, @ANYRES16=r11], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r4], 0x6, 0x1) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = memfd_create(0x0, 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r15 = dup2(r14, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r5, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r16}, 0x30) r18 = getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r18, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) r19 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r19, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:33 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r16 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r16, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x28) 21:59:33 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x0, 0x0) 21:59:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x0, 0x0}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:34 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, 0x0) 21:59:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x29) 21:59:34 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) setsockopt$packet_int(r5, 0x107, 0x10000000000f, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000140)=ANY=[], 0xfef0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r10, @ANYRESHEX, @ANYRES16=r11], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r4], 0x6, 0x1) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = memfd_create(0x0, 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r15 = dup2(r14, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r5, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r16}, 0x30) r18 = getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r18, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) r19 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r19, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:34 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r16 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r16, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x0, 0x0}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:34 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, 0x0) 21:59:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x2a) 21:59:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:35 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5204000000000000, 0x0, 0x0, 0x0) 21:59:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x2b) 21:59:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x2c) 21:59:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x2d) 21:59:35 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x0, 0x0) 21:59:35 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) setsockopt$packet_int(r5, 0x107, 0x10000000000f, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000140)=ANY=[], 0xfef0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r10, @ANYRESHEX, @ANYRES16=r11], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r4], 0x6, 0x1) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = memfd_create(0x0, 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r15 = dup2(r14, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r5, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r16}, 0x30) r18 = getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r18, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:36 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r16 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r16, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:36 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5304000000000000, 0x0, 0x0, 0x0) 21:59:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x2e) 21:59:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x2f) 21:59:37 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) setsockopt$packet_int(r5, 0x107, 0x10000000000f, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000140)=ANY=[], 0xfef0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r10, @ANYRESHEX, @ANYRES16=r11], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r4], 0x6, 0x1) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = memfd_create(0x0, 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r15 = dup2(r14, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r5, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r16}, 0x30) r18 = getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r18, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:37 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6a04000000000000, 0x0, 0x0, 0x0) 21:59:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:37 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:37 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) setsockopt$packet_int(r5, 0x107, 0x10000000000f, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000140)=ANY=[], 0xfef0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r10, @ANYRESHEX, @ANYRES16=r11], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r4], 0x6, 0x1) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = memfd_create(0x0, 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r15 = dup2(r14, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r5, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r16}, 0x30) r18 = getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r18, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:37 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5404000000000000, 0x0, 0x0, 0x0) 21:59:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x30) 21:59:37 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r1, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r15}, 0x30) getpgid(0xffffffffffffffff) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x31) 21:59:38 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6b04000000000000, 0x0, 0x0, 0x0) 21:59:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x0, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x50) 21:59:38 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:38 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5504000000000000, 0x0, 0x0, 0x0) 21:59:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x0, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:38 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r1, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r15}, 0x30) getpgid(0xffffffffffffffff) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x20000232) 21:59:39 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:39 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x0, 0x0) 21:59:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x0, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:39 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5604000000000000, 0x0, 0x0, 0x0) 21:59:39 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r1, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r15}, 0x30) getpgid(0xffffffffffffffff) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:59:40 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:40 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c04000000000000, 0x0, 0x0, 0x0) 21:59:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0x0, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:40 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req={0x200, 0x401, 0xffffff98, 0x4}, 0x7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:59:40 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) setsockopt$packet_int(r5, 0x107, 0x10000000000f, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000140)=ANY=[], 0xfef0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r10, @ANYRESHEX, @ANYRES16=r11], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r4], 0x6, 0x1) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = memfd_create(0x0, 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r15 = dup2(r14, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r5, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) r18 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r18, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:40 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5704000000000000, 0x0, 0x0, 0x0) 21:59:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x710a, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = accept4$inet(r1, &(0x7f0000000240)={0x2, 0x0, @initdev}, &(0x7f0000000280)=0x10, 0x800) fsetxattr$trusted_overlay_nlink(r2, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x32}, 0x16, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f00000000c0)={0x9, 0x1, "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"}) listxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=""/244, 0xf4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x10000, 0x0) r4 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) fcntl$getownex(r4, 0x10, &(0x7f0000000580)={0x0, 0x0}) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r7 = gettid() waitid(0x83b895581628fca4, r7, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r8 = memfd_create(0x0, 0x0) r9 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r10 = dup2(r9, r8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r7, r10, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r5, r6, 0x0, 0x1, &(0x7f0000000080)='\x00', r11}, 0x30) r12 = getpgrp(r5) write$cgroup_pid(r3, &(0x7f00000004c0)=r12, 0x12) 21:59:40 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0x0, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) r2 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) fcntl$getownex(r2, 0x10, &(0x7f0000000580)={0x0, 0x0}) r4 = socket(0x10, 0x80002, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") getsockopt$MISDN_TIME_STAMP(r4, 0x0, 0x1, &(0x7f0000000540), &(0x7f0000000600)=0x4) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r6 = gettid() waitid(0x83b895581628fca4, r6, &(0x7f0000000040), 0x2, &(0x7f0000000480)) membarrier(0x0, 0x0) r7 = memfd_create(0x0, 0x0) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000001640)=[{{0x0, 0x0, 0x1}, {0x3, 0x1, 0x0, 0x1}}, {{0x4, 0x0, 0x0, 0x1}, {0x2}}, {{0x4, 0x1, 0x1}, {0x3, 0x1, 0x1}}, {{0x3, 0x1, 0x1, 0x1}, {0x0, 0x1}}], 0x20) r8 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r9 = dup2(r8, r7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r6, r9, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r3, r5, 0x0, 0x1, &(0x7f0000000080)='\x00', r10}, 0x30) clone3(&(0x7f00000002c0)={0x1000000, &(0x7f0000000000), &(0x7f00000000c0)=0x0, &(0x7f0000000100), {0x6}, &(0x7f0000000140)=""/143, 0x8f, &(0x7f0000000200)=""/78, &(0x7f0000000280)=[r3], 0x1}, 0x50) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r12, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$ION_IOC_HEAP_QUERY(r12, 0xc0184908, &(0x7f00000016c0)={0x34, 0x0, &(0x7f0000001680)}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000380)={{0x4, 0x2, 0x3, 0x100000, 'syz0\x00', 0x6}, 0x6, 0x400, 0x5, r11, 0x1, 0x9, 'syz1\x00', &(0x7f0000000340)=['\'nodev\x00'], 0x7, [], [0x3, 0x0, 0x81, 0x6]}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0x0) 21:59:41 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) setsockopt$packet_int(r5, 0x107, 0x10000000000f, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000140)=ANY=[], 0xfef0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r10, @ANYRESHEX, @ANYRES16=r11], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r4], 0x6, 0x1) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = memfd_create(0x0, 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r15 = dup2(r14, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r5, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) r18 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r18, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000000c0)=0x20) 21:59:41 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6d04000000000000, 0x0, 0x0, 0x0) 21:59:41 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)={0x0, 0x0}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r8, &(0x7f0000000140)=ANY=[], 0xfef0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r9, r9) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r8, @ANYRESHEX, @ANYRES16=r9], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r10 = gettid() waitid(0x83b895581628fca4, r10, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r11 = memfd_create(0x0, 0x0) r12 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r13 = dup2(r12, r11) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r10, r13, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r6, r7, 0x0, 0x1, &(0x7f0000000080)='\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r15, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r14}, 0x30) r16 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r16, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:41 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5804000000000000, 0x0, 0x0, 0x0) 21:59:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0x0, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:42 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) setsockopt$packet_int(r5, 0x107, 0x10000000000f, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000140)=ANY=[], 0xfef0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r10, @ANYRESHEX, @ANYRES16=r11], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r4], 0x6, 0x1) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = memfd_create(0x0, 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r15 = dup2(r14, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r5, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) r18 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r18, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:42 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r8 = gettid() waitid(0x83b895581628fca4, r8, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r9 = memfd_create(0x0, 0x0) r10 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r11 = dup2(r10, r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r8, r11, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r12}, 0x30) r13 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r13, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x0, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:42 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x88200, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000640)={0x64, r4, 0x1, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x8, 0x1, r5}, {0x48, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}]}, 0x64}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}}}, &(0x7f00000001c0)=0xe8) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000200000000", @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29e81d26aa7eff367ec3e89f4a4c20de9619e37f2f84b0d398c27cbd8bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f398e6a3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@ipv4_newaddr={0x28, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r10}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x500}]}, 0x28}}, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000380)=0x0, &(0x7f00000003c0)=0x4) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000200000000", @ANYRES32=r15, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29e81d26aa7eff367ec3e89f4a4c20de9619e37f2f84b0d398c27cbd8bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f398e6a3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@ipv4_newaddr={0x28, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r15}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x500}]}, 0x28}}, 0x0) r16 = socket(0x10, 0x80002, 0x0) ioctl(r16, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") ioctl$sock_SIOCDELRT(r16, 0x890c, &(0x7f00000004c0)={0x0, @sco={0x1f, {0xff, 0x1, 0x6, 0x0, 0x20, 0xfc}}, @phonet={0x23, 0x3, 0x9, 0x2}, @xdp={0x2c, 0x1, 0x0, 0x1d}, 0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)='syzkaller0\x00', 0x5, 0xfffffffffffffeff, 0x3}) r18 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r18, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) getsockopt$inet_IP_XFRM_POLICY(r18, 0x0, 0x11, &(0x7f0000000580)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) r20 = socket(0x10, 0x80002, 0x0) ioctl(r20, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") getsockopt$PNPIPE_IFINDEX(r20, 0x113, 0x2, &(0x7f0000000740)=0x0, &(0x7f0000000780)=0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000007c0)={0x0, @multicast2}, &(0x7f0000000800)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000b40)={'batadv0\x00', 0x0}) r24 = socket(0x10, 0x80002, 0x0) ioctl(r24, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") ioctl$sock_SIOCGIFINDEX(r24, 0x8933, &(0x7f0000003300)={'bridge_slave_1\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003340)={@loopback, @remote, 0x0}, &(0x7f0000003380)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003480)={'team0\x00', 0x0}) r28 = socket$nl_route(0x10, 0x3, 0x0) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000200000000", @ANYRES32=r31, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29e81d26aa7eff367ec3e89f4a4c20de9619e37f2f84b0d398c27cbd8bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f398e6a3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@ipv4_newaddr={0x28, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r31}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x500}]}, 0x28}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000058c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005900)=0x14) r33 = socket$nl_route(0x10, 0x3, 0x0) r34 = socket$netlink(0x10, 0x3, 0x0) r35 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r35, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r35, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r34, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000200000000", @ANYRES32=r36, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29e81d26aa7eff367ec3e89f4a4c20de9619e37f2f84b0d398c27cbd8bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f398e6a3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r33, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@ipv4_newaddr={0x28, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r36}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x500}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005980)={'vcan0\x00', r36}) r38 = socket(0x10, 0x80002, 0x0) ioctl(r38, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") accept$packet(r38, &(0x7f00000059c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005a00)=0x14) r40 = socket$nl_route(0x10, 0x3, 0x0) r41 = socket$netlink(0x10, 0x3, 0x0) r42 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r42, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r42, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r41, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000200000000", @ANYRES32=r43, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29e81d26aa7eff367ec3e89f4a4c20de9619e37f2f84b0d398c27cbd8bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f398e6a3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r40, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@ipv4_newaddr={0x28, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r43}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x500}]}, 0x28}}, 0x0) r44 = socket$nl_route(0x10, 0x3, 0x0) r45 = socket$netlink(0x10, 0x3, 0x0) r46 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r46, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r46, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r45, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000200000000", @ANYRES32=r47, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29e81d26aa7eff367ec3e89f4a4c20de9619e37f2f84b0d398c27cbd8bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f398e6a3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r44, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@ipv4_newaddr={0x28, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r47}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x500}]}, 0x28}}, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000005cc0)={0x0, @can={0x1d, 0x0}, @isdn={0x22, 0xc1, 0x40, 0x0, 0x97}, @ethernet={0x306, @broadcast}, 0xffff, 0x0, 0x0, 0x0, 0x2, &(0x7f0000005c80)='veth1_to_team\x00', 0x8001, 0x9a, 0x100}) r49 = socket$nl_route(0x10, 0x3, 0x0) r50 = socket$netlink(0x10, 0x3, 0x0) r51 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r51, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r51, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r50, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000200000000", @ANYRES32=r52, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29e81d26aa7eff367ec3e89f4a4c20de9619e37f2f84b0d398c27cbd8bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f398e6a3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r49, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@ipv4_newaddr={0x28, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r52}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x500}]}, 0x28}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000005d40)={{{@in6=@ipv4={[], [], @broadcast}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000005e40)=0xe8) r54 = socket$nl_route(0x10, 0x3, 0x0) r55 = socket$netlink(0x10, 0x3, 0x0) r56 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r56, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r56, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r55, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000200000000", @ANYRES32=r57, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29e81d26aa7eff367ec3e89f4a4c20de9619e37f2f84b0d398c27cbd8bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f398e6a3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r54, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@ipv4_newaddr={0x28, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r57}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x500}]}, 0x28}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000006880)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000006840)={&(0x7f0000005e80)={0x984, r4, 0x408, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r6}, {0x10c, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xff3}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r11}, {0xd4, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0xb6}}, {0x8, 0x6, r15}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x2, 0x81, 0xff, 0xe5}, {0xfffa, 0x6, 0x3, 0x10000}]}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r17}, {0x1e0, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r19}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x7fff, 0x5, 0x5, 0x1}, {0xfff9, 0x1f, 0x5, 0x7}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x401}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r25}, {0x18c, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x41d6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r26}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xb7}}}]}}, {{0x8, 0x1, r27}, {0xac, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r31}}}]}}, {{0x8, 0x1, r32}, {0xf4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r37}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x2814}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r39}}, {0x8}}}]}}, {{0x8}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r43}, {0x100, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r47}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r48}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r52}}, {0x8}}}]}}, {{0x8, 0x1, r53}, {0xfc, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x800}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r57}}}]}}]}, 0x984}, 0x1, 0x0, 0x0, 0x10}, 0x40) 21:59:42 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6e04000000000000, 0x0, 0x0, 0x0) 21:59:42 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r8 = gettid() waitid(0x83b895581628fca4, r8, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r9 = memfd_create(0x0, 0x0) r10 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r11 = dup2(r10, r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r8, r11, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r12}, 0x30) r13 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r13, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:42 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5904000000000000, 0x0, 0x0, 0x0) [ 1162.499316][T20755] team0: No ports can be present during mode change 21:59:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x0, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:43 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) setsockopt$packet_int(r5, 0x107, 0x10000000000f, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000140)=ANY=[], 0xfef0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r10, @ANYRESHEX, @ANYRES16=r11], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r4], 0x6, 0x1) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = memfd_create(0x0, 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r15 = dup2(r14, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r5, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) r18 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r18, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:43 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r8 = gettid() waitid(0x83b895581628fca4, r8, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r9 = memfd_create(0x0, 0x0) r10 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r11 = dup2(r10, r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r8, r11, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r12}, 0x30) r13 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r13, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) [ 1163.179372][T20754] team0: No ports can be present during mode change 21:59:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x0, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:43 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) setsockopt$packet_int(r5, 0x107, 0x10000000000f, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000140)=ANY=[], 0xfef0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r10, @ANYRESHEX, @ANYRES16=r11], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r4], 0x6, 0x1) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = memfd_create(0x0, 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r15 = dup2(r14, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r5, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) r18 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r18, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:43 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6f04000000000000, 0x0, 0x0, 0x0) 21:59:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee14115621b35a30b55da55b1bf59fc669edc78ac7b570821dbcd954e22da3fabbbebc4a2aaa9f39558d924791044b2732bcce294e1c3f777895a7f0d9a6d7779e9813cbc99846dcec29368d633a509ba385b19101b7541079bc34f5daa3b5d90c4fedf5bf0fdaeb48bca7a6803f942a1aa2b95e88d236d493f93c424a38bda23"], 0x32) 21:59:44 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5a04000000000000, 0x0, 0x0, 0x0) 21:59:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x0, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000004}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x200, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004081}, 0x4) 21:59:44 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r8 = gettid() waitid(0x83b895581628fca4, r8, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r9 = memfd_create(0x0, 0x0) r10 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r11 = dup2(r10, r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r8, r11, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r12}, 0x30) r13 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r13, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x0, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:44 executing program 1: io_getevents(0x0, 0x2, 0x1, &(0x7f0000000000)=[{}], &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x101800, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e23, 0xeff, @dev={0xfe, 0x80, [], 0x2e}, 0x9}}}, &(0x7f0000000540)=0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000580)=@sack_info={r2, 0xa4c, 0x4b4b}, 0xc) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$VIDIOC_G_CROP(r3, 0xc014563b, &(0x7f0000000200)={0x7, {0x80, 0x1, 0xfffffffe, 0x7}}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b259b3b00000000e0ffffff0000e30cf8ea20981ea0cb03906ee1412e0000000000000000000000000000000000745000008eafba7ddd44ce3620febac3bfa7cb5854aa935f41e4f43416cc856f4eaff0c9159a19000046ce0000e6bbf5be116d10d1d5ec1402d774b3724ea28c71af9840205d4919902b095a18659f06786ab2e04161350a45e3ec2a0c97a6749fbeff9a6b91c0399747df2137d2a97b64bbf81021a4ad07330595f190c8c901283d6194a196806ee080d6e7a37835bdea0a5190835b37b2c7b80f7c242dcfa77eaf3a47"], 0x32) r4 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @local}, 0x10, 0x800) getsockopt$bt_hci(r4, 0x0, 0x1, &(0x7f0000000280)=""/37, &(0x7f00000002c0)=0x25) 21:59:45 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7004000000000000, 0x0, 0x0, 0x0) 21:59:45 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5b04000000000000, 0x0, 0x0, 0x0) 21:59:45 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) setsockopt$packet_int(r5, 0x107, 0x10000000000f, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000140)=ANY=[], 0xfef0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r10, @ANYRESHEX, @ANYRES16=r11], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r4], 0x6, 0x1) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = memfd_create(0x0, 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r15 = dup2(r14, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r5, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) r18 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r18, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:45 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0xda, 0x7}, 0xc) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:59:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x0, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:45 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r8 = gettid() waitid(0x83b895581628fca4, r8, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r9 = memfd_create(0x0, 0x0) r10 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) dup2(r10, r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r11}, 0x30) r12 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r12, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:59:45 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) setsockopt$packet_int(r5, 0x107, 0x10000000000f, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000140)=ANY=[], 0xfef0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r10, @ANYRESHEX, @ANYRES16=r11], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r4], 0x6, 0x1) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = memfd_create(0x0, 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r15 = dup2(r14, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r5, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) r18 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r18, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:46 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7104000000000000, 0x0, 0x0, 0x0) 21:59:46 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5c04000000000000, 0x0, 0x0, 0x0) 21:59:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x0, 0x6, 0x0}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000180)={0x3, 0x2, 0x1ff, 0x9e, &(0x7f0000000300)=""/158, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x126) ioctl$VIDIOC_SUBDEV_S_CROP(r2, 0xc038563c, &(0x7f0000000140)={0x748ee795456765a8, 0x0, {0x7, 0xfffffff8, 0x7, 0xbc3}}) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r1, 0x80585414, &(0x7f00000000c0)) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:59:46 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r8 = gettid() waitid(0x83b895581628fca4, r8, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r9 = memfd_create(0x0, 0x0) r10 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) dup2(r10, r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r11}, 0x30) r12 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r12, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:46 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) setsockopt$packet_int(r5, 0x107, 0x10000000000f, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000140)=ANY=[], 0xfef0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r10, @ANYRESHEX, @ANYRES16=r11], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r4], 0x6, 0x1) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = memfd_create(0x0, 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r15 = dup2(r14, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r5, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) r18 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r18, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x0, 0x6, 0x0}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:47 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x76, &(0x7f00000000c0)={r3}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={r3, 0x1, 0x10}, &(0x7f0000000140)=0xc) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r4, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3bd977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf00"/50], 0x32) r5 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x10) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) write$P9_RVERSION(r6, &(0x7f0000000040)={0x13, 0x65, 0xffff, 0x3f, 0xffffffffffffff4f, '9P2000'}, 0x13) 21:59:47 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r8 = gettid() waitid(0x83b895581628fca4, r8, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r9 = memfd_create(0x0, 0x0) r10 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) dup2(r10, r9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r11 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r11, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:47 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5d04000000000000, 0x0, 0x0, 0x0) 21:59:47 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) setsockopt$packet_int(r5, 0x107, 0x10000000000f, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000140)=ANY=[], 0xfef0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r10, @ANYRESHEX, @ANYRES16=r11], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r4], 0x6, 0x1) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = memfd_create(0x0, 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r15 = dup2(r14, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r5, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) r18 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r18, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) socket$bt_bnep(0x1f, 0x3, 0x4) 21:59:47 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7204000000000000, 0x0, 0x0, 0x0) 21:59:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x0, 0x6, 0x0}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) 21:59:47 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r8 = gettid() waitid(0x83b895581628fca4, r8, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r9 = memfd_create(0x0, 0x0) r10 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) dup2(r10, r9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r11 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r11, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x0, 0x6, &(0x7f0000000140)}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:48 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r8 = gettid() waitid(0x83b895581628fca4, r8, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r9 = memfd_create(0x0, 0x0) r10 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) dup2(r10, r9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r11 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r11, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:48 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x100, 0xbcd, 0x0, 0x3}) r2 = socket$inet(0x2, 0x803, 0xa0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) setsockopt$inet_mreqsrc(r2, 0x0, 0xf, 0x0, 0x0) socket$packet(0x11, 0xdda493e61b6992e, 0x300) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000040)=0x3, 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x32) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0x80) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000180)={0x1, r4}) 21:59:48 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x0, 0x0) 21:59:48 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) setsockopt$packet_int(r5, 0x107, 0x10000000000f, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) fcntl$getownex(r7, 0x10, &(0x7f0000000580)={0x0, 0x0}) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000140)=ANY=[], 0xfef0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r10, @ANYRESHEX, @ANYRES16=r11], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r4], 0x6, 0x1) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r13 = memfd_create(0x0, 0x0) r14 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r15 = dup2(r14, r13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x1, &(0x7f0000000080)='\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r6, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r16}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r17, r5, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r16}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r16}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r16}, 0x30) r18 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r18, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:48 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7304000000000000, 0x0, 0x0, 0x0) 21:59:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100a0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:59:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x0, 0x6, &(0x7f0000000140)}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:48 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r8 = gettid() waitid(0x83b895581628fca4, r8, &(0x7f0000000040), 0x2, &(0x7f0000000480)) memfd_create(0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r9, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:59:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x0, 0x6, &(0x7f0000000140)}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:49 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x0, 0x0) 21:59:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b259b3b00000a0022d8e2b5bc29391a6d9ed977e30c03277ec474522cd96235a30b55da55b1e05e8fbf0000000000000000543b2681560c7d554e556cb7f494d2967245ce2efbcf7d418486a8f72e8767eacbbc3520e345f0a574374734f4213fb696f966596f15c11799974d46d3f38d62b645e478ba"], 0x32) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x1, 0x404100) 21:59:49 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r8 = gettid() waitid(0x83b895581628fca4, r8, &(0x7f0000000040), 0x2, &(0x7f0000000480)) memfd_create(0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r9, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:49 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x1b, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf9"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:49 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x0, 0x0) 21:59:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc3a813856863cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x42f082e742c2df0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x233040) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0x1}, 0x8) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000000000000000e3b0000d977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:59:50 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r16 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r16, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:50 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, r0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/cachefiles\x00', 0x608500, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000001300)=[@in={0x2, 0x4e20, @local}], 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x8) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000140)=0x4) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf15f93e31d8273b8ef7148a9c0492c1ac438b6031d0a7ef40d796388f72b808096b50ab758af93251b95ccf017426"], 0x32) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000001640)={{0x0, 0x0, 0x80}}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, &(0x7f0000000200)={{0x9, 0x5, 0x4, 0x7f, 0x0, 0x3f}, 0x80, 0xb0, 0x5, 0x4, 0x1, "2da829e0b118f18a9a6ada93d0031365367771fd15d35ce9fa27771fe7515c391b8d94a955ceef3fc34fa959475b08f472d898ea3b02e3e29d1093911319be9c813699c33cc6309f5a649202bc7123f4d8a1546cd0b60d987a8e5c527a15efedf5f3b57f6cbb82e90150f65c8b23bb1270bf5fd7542580b9a1005a7ea0232659"}) 21:59:50 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r8 = gettid() waitid(0x83b895581628fca4, r8, &(0x7f0000000040), 0x2, &(0x7f0000000480)) memfd_create(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r9, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:50 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x0, 0x0) 21:59:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x120, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b259b1c0fcf4f3d30d3a69e88d0b9fe2cebede9467ed7e2d43b0000000000000000000000006d9ed918db3d5e582746296f4a26157b54bd79417cc3a6c17aa512ae83430dac7337c14e606fbab9d5a75455a725af400618836b17fee2d453a331bf5a38d3fd909412f4707d9912530297677918eb0e899ff14d9f58f1f93d3661941437242d0f58933275151f887ab748a9c6bca28d213a7dddb9dd9067ad61a03394ba3c7bafe2dc07ab12d25e1271bab8243658c473245d3ef4cbfe"], 0x32) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f0000000000)={0xfffffffc, 0x2}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000180)) 21:59:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x1b, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf9"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:50 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7404000000000000, 0x0, 0x0, 0x0) 21:59:51 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r16 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r16, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:51 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r8 = gettid() waitid(0x83b895581628fca4, r8, &(0x7f0000000040), 0x2, &(0x7f0000000480)) memfd_create(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r9, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:59:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x1b, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf9"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:51 executing program 1: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttynull\x00', 0x20000, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="1b259b3b0000000000000000a0bf72517eaf4aae2500437d90000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:59:51 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x0, 0x0) 21:59:51 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r8 = gettid() waitid(0x83b895581628fca4, r8, &(0x7f0000000040), 0x2, &(0x7f0000000480)) memfd_create(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r9, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x28, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b8"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000010000000100000058274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:59:52 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7504000000000000, 0x0, 0x0, 0x0) 21:59:52 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r8 = gettid() waitid(0x83b895581628fca4, r8, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r9, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:52 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r16 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r16, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x28, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b8"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ae141a30b55da55b1e05e8fbf"], 0x32) 21:59:52 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0) 21:59:52 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) gettid() syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r8, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:53 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) r1 = socket$netlink(0x10, 0x3, 0xd) r2 = syz_genetlink_get_family_id$gtp(&(0x7f00000000c0)='gtp\x00') r3 = socket(0x10, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f0000000280)=0x0, &(0x7f00000002c0)=0x4) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r5, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x420100}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, r2, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@GTPA_LINK={0x8, 0x1, r4}, @GTPA_NET_NS_FD={0x8, 0x7, r5}, @GTPA_FLOW={0x6, 0x6, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x15e9953a266cadf}, 0x4000041) 21:59:53 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x0, 0x0) 21:59:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x28, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b8"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:53 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c62b2185445b002a85210f68e7b58274629777ff4f0a9636ee1412e62"], 0x32) 21:59:53 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) gettid() syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r8, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:53 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0) 21:59:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x2f, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x200, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f00000000c0)=0x9) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b00000000000000000000ab16bf49d977e30c6258274629777fedf0a9636ee1414c621b35a30b55da55b1e05e8bbf0162241842c44cd95c98c08734dc83a288847cb29169b81f6fa8973cda6cf07c4afc17"], 0x32) 21:59:54 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:54 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0) 21:59:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x2f, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:54 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) gettid() syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r8, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4008550d, &(0x7f0000000000)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:59:55 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0) 21:59:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x2f, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f0000000140)=""/109}) ioctl$VFIO_IOMMU_GET_INFO(r1, 0x3b70, &(0x7f0000000000)={0x18, 0x0, 0x0, 0xffff}) 21:59:55 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)={0x0, 0x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r9, @ANYRESHEX, @ANYRES16=r10], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r11 = gettid() waitid(0x83b895581628fca4, r11, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r12 = memfd_create(0x0, 0x0) r13 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r14 = dup2(r13, r12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, r14, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r16, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r15}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r15}, 0x30) r17 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r17, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:55 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0) 21:59:55 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r8, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x32, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0xd6, "7427f75df01c47ce9c3d3c0425a3ebcc3e9e69b82909b48875bc65da134d53afd3f12f33c65c332d3eb28375ddd97fe05c0a6ad9fda1bb4049a1a3dc9600c5ed34f9602ad13efb261c280a465ab793eb3ea139dcaa14cd0771255f1f2d1f563d60aec3e3c8555bdeecc5e621206f275b3e862a4fbd109de9ec2bedfb07ea0b5c975b5068c617fc37d6d4bf02e07d21bffb2bf54d98e53ef5e52906d25b9875a8c1c297bd945b94d64ad3a06c678aaddaad0a50d6eee921d651a81af34f13ecf391ef088f49f7ebb09f6f4e2c76eb361d83e17f74d8b0"}, &(0x7f0000000000)=0xfa) 21:59:56 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)={0x0, 0x0}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r8, &(0x7f0000000140)=ANY=[], 0xfef0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r9, r9) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r8, @ANYRESHEX, @ANYRES16=r9], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r10 = gettid() waitid(0x83b895581628fca4, r10, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r11 = memfd_create(0x0, 0x0) r12 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r13 = dup2(r12, r11) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r10, r13, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r6, r7, 0x0, 0x1, &(0x7f0000000080)='\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r15, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r14}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r14}, 0x30) r16 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r16, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:56 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0) 21:59:56 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r6, @ANYRESHEX, @ANYRES16=r7], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r8, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x32, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:56 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x202}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = accept4$tipc(r0, &(0x7f0000000000)=@id, &(0x7f0000000040)=0x10, 0x800) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) r3 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r4, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f0000000140)={0x4, 0xfca7e16687a2de22, 0x4, 0x4, 0x9, {}, {0x3, 0x1, 0x81, 0x5b, 0x1, 0x8, "a5f3b01c"}, 0x5, 0x4, @fd=r4, 0x1ff, 0x0, r5}) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0008000000040000000000006d9ed977e30c625827462900800000a9636ee1412e621b35a3cc55da55b1e04e8fbf"], 0x32) 21:59:56 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0) 21:59:56 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)={0x0, 0x0}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r8, &(0x7f0000000140)=ANY=[], 0xfef0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r9, r9) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r8, @ANYRESHEX, @ANYRES16=r9], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r10 = gettid() waitid(0x83b895581628fca4, r10, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r11 = memfd_create(0x0, 0x0) r12 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r13 = dup2(r12, r11) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r10, r13, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r6, r7, 0x0, 0x1, &(0x7f0000000080)='\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r15, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r14}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r14}, 0x30) r16 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r16, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x3ea, 0xfe, 0x0, 0x0, 0x0, 0xfedc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0x7, &(0x7f0000000140)=0x0) io_submit(r4, 0x0, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = eventfd(0x0) io_submit(r4, 0x2, &(0x7f00000006c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x1, r6}, 0x0]) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b259b7b00000000000000000000267ab74be69e83089a2b00006d9ed977e30c62ce55fcca58274629777ff4f0a9636ee1412e62ca6ec3aa48dd55d600000000"], 0x32) 21:59:57 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r8, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:57 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf825000000000000, 0x0, 0x0, 0x0) 21:59:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x32, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf61773ba9529838265dd13392935f95c79f806c0592186f33907a700b5eacb28af486ee928ea77ceb1bea870edf6c3a209f7f67a906fcc9cc0dcc622f7ce87f1ea6c8efb14535c8682d5517b315c0b41a9cd3160e42cc317e4a5cd76ad83c3ab80efb3adbc9c582fbbb895f9cd273cee4c5e372a0c4cea807fcbdf39ff3a60d7a2d1e3d261f3aeefc4657e2d9735dc89d58a69b81f68595b7b1e4c1b345914a8c3bc7ebc78180766173cd2984dc84a767eb489adfd60e0d7044e8a39cf9d8673cdae835fa677edc374fb1dab100"], 0x32) 21:59:57 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)={0x0, 0x0}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r8, &(0x7f0000000140)=ANY=[], 0xfef0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r9, r9) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r8, @ANYRESHEX, @ANYRES16=r9], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r10 = gettid() waitid(0x83b895581628fca4, r10, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r11 = memfd_create(0x0, 0x0) r12 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r13 = dup2(r12, r11) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r10, r13, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r6, r7, 0x0, 0x1, &(0x7f0000000080)='\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r15, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r14}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r14}, 0x30) r16 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r16, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) r1 = socket$inet(0x2, 0x803, 0xa0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) setsockopt$inet_mreqsrc(r1, 0x0, 0xf, 0x0, 0xffffffcf) r2 = socket(0x1d, 0x1, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) tee(r1, r3, 0x200, 0x2) r4 = socket(0x10, 0x80002, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f00000000c0)="344fc919653e2b1decf000ebe8bcaa505ab63013eb8c57ce95bcc77eefbc7f5b027e1ac2767ebb23ad4cedc5016f138366f10d9eae4c1c4817aa6401938e22d04af2abfdb6450bb2b0b5c347cc3a009f5b47b984dbb4bfad6ce13c1966b8d017fe26b8b411e1f97d79ba844298f61fb1381624c4e92c357d2d62a7af5cd682021f0ed109176522fdfbdd704a4ec687efe207063873d851b8e1a299b3c1251051f0858ec71905f914c6abded7d6d4071b1df594cbd02016dd", 0xb8) 21:59:57 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0) 21:59:57 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) socket$inet6_tcp(0xa, 0x1, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r7, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x34, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed67"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:58 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000100)="b51e6bb6bb5ef3a6ba2b8a601c4429ca45088ba7359ec50117b0594c46e2c453bef991cbb0d02959143b4eb57011302f2e5b1e45c6df3ad82aaeb7c5d34f790b3b78c04af7a468f057bd2cb0aa9b598529797e0b41ee8ea0b2d84c9583afb86e52aaa1ea747fbc26f03ec247229baa64c22058e3e5c07830d18f51a6a52a14c6f467beaccaf00b2f3d9b1fce596656514493ca3cfc7c9b7a359c7b89cb31d363bc7a2109d3ccf2", &(0x7f0000000240)=""/227}, 0x20) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x40) 21:59:58 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf9fdffff00000000, 0x0, 0x0, 0x0) [ 1177.736290][T21232] can: request_module (can-proto-0) failed. [ 1177.894789][T21232] can: request_module (can-proto-0) failed. 21:59:58 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r7, @ANYRESHEX, @ANYRES16=r8], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r9 = gettid() waitid(0x83b895581628fca4, r9, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r10 = memfd_create(0x0, 0x0) r11 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r12 = dup2(r11, r10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r9, r12, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r13}, 0x30) r14 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r14, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:58 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf9fdffff00000000, 0x0, 0x0, 0x0) 21:59:58 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r7, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x34, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed67"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000000)={0x7, 0x6, 0x20}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 21:59:59 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r7, @ANYRESHEX, @ANYRES16=r8], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r9 = gettid() waitid(0x83b895581628fca4, r9, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r10 = memfd_create(0x0, 0x0) r11 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r12 = dup2(r11, r10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r9, r12, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r13}, 0x30) r14 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r14, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:59 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfbffffff00000000, 0x0, 0x0, 0x0) 21:59:59 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r7, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 21:59:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x34, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed67"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 21:59:59 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfbffffff00000000, 0x0, 0x0, 0x0) 22:00:00 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000000)={{0x2, @name="fb0d17eb624a677a73b991b789f81745ac4e5d3d947d6173b7fe26573027b8e9"}, 0x8, 0xc00, 0x10001}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 22:00:00 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r7, @ANYRESHEX, @ANYRES16=r8], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r9 = gettid() waitid(0x83b895581628fca4, r9, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r10 = memfd_create(0x0, 0x0) r11 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r12 = dup2(r11, r10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r9, r12, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r13}, 0x30) r14 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r14, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:00 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r7, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r0, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 22:00:00 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xff00000000000000, 0x0, 0x0, 0x0) 22:00:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e0098fbf"], 0x32) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000000)) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r2, 0x4038564f, &(0x7f0000000140)={{0x0, @addr=0x3}, 0x8, 0x3, 0x7}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r6 = dup(r4) sendmsg$TIPC_NL_BEARER_ADD(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0x30, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_NAME={0x4, 0x1, @l2={'ib', 0x3a, 'bridge_slave_1\x00'}}]}]}, 0x30}}, 0x0) sendmsg$TIPC_NL_MON_SET(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r5, 0x200, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x6e091}, 0x4050) ioctl$NBD_SET_SIZE(r3, 0xab02, 0x8) 22:00:00 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)) socket$inet6_tcp(0xa, 0x1, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:00 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r7, @ANYRESHEX, @ANYRES16=r8], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r9 = gettid() waitid(0x83b895581628fca4, r9, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r10 = memfd_create(0x0, 0x0) r11 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r12 = dup2(r11, r10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r9, r12, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r13}, 0x30) r14 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r14, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r0, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 22:00:01 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xff00000000000000, 0x0, 0x0, 0x0) 22:00:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x1, @remote, 0xe9e6}, {0xa, 0x4e20, 0x1, @mcast2, 0x4}, r3, 0x6}}, 0x48) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0xffffffffffffff21) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r4, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0xffaf) r6 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}}}, 0x20) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r8, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r8, 0x80184153, &(0x7f0000001bc0)={0x0, &(0x7f0000001b40)=[&(0x7f0000000580)="5abdc236ac12583d402e945600074f0dac4e4c6380eab8af51fffe68c38b134cd9d055874e4601b0ee515cd038e05f832e829772b5fcdf183fbc5e1707166d13d057314716a578b6b3edf77b0ab641c4c47625826c12674f281b3565f794c5495ece9acfd8b0d91057d4e34e072bf7e66bf9aefc3f93965d547037ae0ba1fbda8fe1281a90199d33ff7259fdf935a0e05cd0bae545d000a9881c321f11b713738eb3ea36", &(0x7f0000001640)="d2d12b7f48b23a919849a8938b166971fe8d6c70485cb9c7f5792c41749d294ae2f3fcb02cec9a78704ce1ac63ea630242aca3ae2a58bb47550161432895b67f83d5512a16871be451cc4d8fb36d1b47301006855b3852351ea5548b0322ecbe91ab0fe4d584448205ef0e868aafc49524b3b935fc496858a24a00b238a15579ab6f23696101c23f8eb7fd4b5c8a5692148b0e44bc28de66c3dbe7d4e4a9cc", &(0x7f0000001700)="1bdf860a4c45b5e9c521a9c2ae0378db0996b016d104a2d1616c40b719b6b2689704724b1a399bd8005128d0021c067d35dcef5bb9b47c27d00454fa85a662cca4b8dc4d449860612233c8296ee3bf1ffbba01a4fc1ab0e9887789a8174b2e343d3e98fa8fd3f8c2fdfb45a71233a7143564fed947e8720d22f3c68607867f34588ed909", &(0x7f00000017c0)="21e963847eb78a1dcb3eb2b5cd1a8db14bfb06c2c7241cc9882240e814eb9f5d963721b3481e061506b80a551218ae5613d60a9be491d5455c58fef2c2781cdc2a22524b773cc0ab85b12ea67a093097d03f50eb7445831d86c432e0b80dc05c20f1909a4ec655ee821051193ee68eea25f8087f1b7d83e560235397cad06c33feb69502522b7851978d16849a6df09f72acfbcdbc1aeb43a76f5f97b865deb0f01ec4ec2a6fc907b266ffc8fe5f6613", &(0x7f0000001880)="a06fd2b30b57d90615d0ba3ce2ffbe42b951d99de51f2abbbff2bb5769b8926a4a6ea22597ac1676c5b7e6c0df260e0ae49c1066744a6aa3352dc0d932c75ccdd4f580238a7cf7846b29d12e536cbb1f32591d65dbf06b069a7b04ed17924a04f49d1bea8990253caceb6efaea8206e04c93c7cda5e5bb41519f285f2d11806e62dee7f1d84086", &(0x7f0000001940), &(0x7f0000001980)="ffa6622004568f62b1cca05bac8a6e95086b97ef75c21fb3a835de1b40f37a7c787da23a4f768730c034ee8a9b0062c2be631a2650ce492a3fad27d93523385b38b4ab759b63ae93ece57e8be9ffee11888ab9b7ef11bc24607c639ac91c72e0adf837ab92523e9efcdc6ca9ff100829b1a3566541a41b392b1bc7018a3ded1e11b78b11f601e63e199c962ef3377e18cad4a3ec869bd92200ffb1c50b3870412ed93c2cf8721b00a142c78d96bb889240924fc1fd52c2ce0b4eddee4f675bb23218859ed61286a0c058e6df24de4d5523701019b8ff7f317fa84854de14654f3ac6132e6281da09854b26e0a8061fe472f98f8863def602", &(0x7f0000001a80)="3ce17321212b0dc51575128f050da584d9057717bd1bf36de8288bd6c3bb40a6a96e343a8f7f6cf015a7ffdfeaf15bebac35cda5c6777f3f6a5f6c400f52001c02763b5df9f9e017624557e350e24a0239f2e4", &(0x7f0000001b00)="42508f0670a80aecebd8410405db1934dad530f3afbc41d68f22dda3f9b4431ffee4abf0166fc4632fbd24b6bf6c281a423e"]}) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000400), r7, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000000440)={0x8, 0x120, 0xfa00, {0x0, {0x8, 0x6, "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", 0x40, 0x4, 0x7, 0x6, 0x84, 0x3, 0x8}, r7}}, 0x128) r9 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r9, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r9, 0xc0945662, &(0x7f0000000240)={0x3ff, 0x0, [], {0x0, @reserved}}) 22:00:01 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)) socket$inet6_tcp(0xa, 0x1, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:01 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) sendfile(r0, r2, 0x0, 0x2) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b1f00000000000000006d9ed977e30c4258270029777ff4f0a9636ee1412e620800000000000000e05e8fbf000000"], 0x32) 22:00:01 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r7, @ANYRESHEX, @ANYRES16=r8], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r9 = gettid() waitid(0x83b895581628fca4, r9, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r10 = memfd_create(0x0, 0x0) r11 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) dup2(r11, r10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r12}, 0x30) r13 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r13, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r0, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 22:00:01 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xff0f000000000000, 0x0, 0x0, 0x0) 22:00:01 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)) socket$inet6_tcp(0xa, 0x1, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:02 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 22:00:02 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r7, @ANYRESHEX, @ANYRES16=r8], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r9 = gettid() waitid(0x83b895581628fca4, r9, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r10 = memfd_create(0x0, 0x0) r11 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) dup2(r11, r10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r12}, 0x30) r13 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r13, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:02 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xff0f000000000000, 0x0, 0x0, 0x0) 22:00:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 22:00:02 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) socket$inet6_tcp(0xa, 0x1, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:02 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x1e0c02, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x241) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f0000000240)={0x6a}) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000000000000201c000ee06db2e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000000c0)) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000180)={0x1, 0x1, 0x10000, 0xffff, 0x2, 0x178}) 22:00:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 22:00:02 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffefffff00000000, 0x0, 0x0, 0x0) 22:00:03 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r7, @ANYRESHEX, @ANYRES16=r8], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r9 = gettid() waitid(0x83b895581628fca4, r9, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r10 = memfd_create(0x0, 0x0) r11 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) dup2(r11, r10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r12}, 0x30) r13 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r13, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:03 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) socket$inet6_tcp(0xa, 0x1, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") getpeername$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000200000000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29e81d26aa7eff367ec3e89f4a4c20de9619e37f2f84b0d398c27cbd8bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f398e6a3d5d936f0b95a5"], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@ipv4_newaddr={0x18, 0x14, 0x121, 0x40000, 0x0, {0x2, 0x0, 0x0, 0x0, r7}}, 0x18}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000800)={&(0x7f0000000380)={0x478, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r1}, @NL80211_ATTR_TX_RATES={0xd4, 0x5a, [@NL80211_BAND_5GHZ={0x54, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x40fa, 0x1, 0xbf88, 0x0, 0x6, 0x7f, 0x3]}}, @NL80211_TXRATE_LEGACY={0x22, 0x1, "12521fabe51171f56116d7a02f9a0f8dd8235fb60fe03ba2ade3dcf212cf"}, @NL80211_TXRATE_LEGACY={0x10, 0x1, "f353524c376306cd6f4e099d"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1a747488c3b9dcfa}]}, @NL80211_BAND_60GHZ={0x10, 0x2, [@NL80211_TXRATE_HT={0xb, 0x2, "7622d3cc7c4929"}]}, @NL80211_BAND_60GHZ={0x1c, 0x2, [@NL80211_TXRATE_LEGACY={0x17, 0x1, "58efacc7ab25295ef894c094f623c55e1e4f4f"}]}, @NL80211_BAND_6GHZ={0x50, 0x3, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x2, 0xf8b1, 0x9, 0xfff9, 0x0, 0x8, 0x8f1, 0x5]}}, @NL80211_TXRATE_LEGACY={0x16, 0x1, "8f89d58c42689ce39934931a2263ba36ed3e"}, @NL80211_TXRATE_LEGACY={0x18, 0x1, "899727ed14e38269434662490b4ddead5a495619"}, @NL80211_TXRATE_LEGACY={0x7, 0x1, "7b0ec3"}]}]}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x5}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r3}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_TX_RATES={0x334, 0x5a, [@NL80211_BAND_2GHZ={0x74, 0x0, [@NL80211_TXRATE_LEGACY={0x17, 0x1, "07d875a4af9b474abb550a4de081a45feaeb52"}, @NL80211_TXRATE_HT={0x2a, 0x2, "7b0304536c9de95e35c7185f28efdbdb108ef976977094dbc39b9f4550bf5a9dbd8741d1ac62"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0xf, 0x1, "f8ed14caf9ab4404768d39"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x5, 0xf251, 0x1, 0x6, 0x95, 0xb3dc, 0xef0]}}]}, @NL80211_BAND_2GHZ={0x20, 0x0, [@NL80211_TXRATE_LEGACY={0x9, 0x1, "aea8b0732f"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x4}]}, @NL80211_BAND_2GHZ={0xd0, 0x0, [@NL80211_TXRATE_LEGACY={0x16, 0x1, "aa9d867aeff3db3b38550445cf0b1acb5ad8"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1ff, 0x5, 0x8c9, 0x3f, 0x0, 0x6, 0x8, 0x2]}}, @NL80211_TXRATE_HT={0x34, 0x2, "566934e12d85b5c1474d9340bca61e3a44551b76a812a3a6d0743b8f5400e2f2f742d8c8f1af87673a8c460525a7d535"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x2bc, 0x4, 0x0, 0x5, 0x1, 0x6, 0x263c, 0xb31e]}}, @NL80211_TXRATE_HT={0x39, 0x2, "34ef06c67c2c2ce2bf8abe4be16a17b2e15bb5f588b9b2188d2681270a716897fe315fbe83bfe7db2a2fbe6351c6bba70eaed9ec91"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7ff, 0x7, 0x3f, 0x20, 0x4, 0x9, 0x3, 0x401]}}]}, @NL80211_BAND_5GHZ={0x4c, 0x1, [@NL80211_TXRATE_HT={0x32, 0x2, "5e610d747f09b8cf1d6e06555ecdfaca3becc0af9341e83ebf0d9c29ca1b506a743e0317db53fa5a23b9aebb0858"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0x6, 0x8, 0x90, 0x9, 0x9, 0x3f, 0x9]}}]}, @NL80211_BAND_2GHZ={0xa8, 0x0, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0xe, 0x1, "d0ba8a0dc3ed45b57b20"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3f, 0x1, 0xfffb, 0x6, 0x0, 0x292c, 0x5, 0x1]}}, @NL80211_TXRATE_LEGACY={0x8, 0x1, "b3177914"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0xf, 0x1, "90ec462ab72f03eb52b768"}, @NL80211_TXRATE_LEGACY={0x22, 0x1, "7e726b150ced1ad789092f4c5bbaa35e91586ff48a745c05407230bbdda3"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0x1, 0xff, 0x200, 0x0, 0x3, 0x2, 0x9b]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x16, 0x1, "f5b2662d5b83bd7705c14029abfb34389022"}]}, @NL80211_BAND_2GHZ={0x18, 0x0, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0xa3d3, 0x3, 0x69, 0xff59, 0xfff9, 0x0, 0x7, 0x5]}}]}, @NL80211_BAND_6GHZ={0xa0, 0x3, [@NL80211_TXRATE_HT={0x38, 0x2, "3f3fce0a3bd8f538c7728f5668dd1384bbcf7a2eccda37dd58671860582acab37e99206e31b4739c79859e09d958ef3ab94ffc13"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x3}, @NL80211_TXRATE_HT={0x1c, 0x2, "39363aca2371031d566d73d96505160f6f2b87ca8a7f8cc0"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0x8, 0x5, 0x2, 0x7fff, 0x6, 0x7, 0x2]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0xc, 0x1, "b800bc4b73d5a944"}, @NL80211_TXRATE_HT={0x18, 0x2, "2bc13e38b11e872fd9962502dbcdbbcfda04ab9e"}]}, @NL80211_BAND_5GHZ={0x20, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x400, 0xff, 0x40, 0x7, 0x4, 0xfffc, 0x9, 0x9]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}]}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0xfb}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x401, 0x7f}}, @NL80211_ATTR_BSS_BASIC_RATES={0x1f, 0x24, "94add843e9469b992e6a0dde72f7f3f821f4ce11ad798849039436"}]}, 0x478}, 0x1, 0x0, 0x0, 0x40}, 0x10010) r8 = socket(0x10, 0x80002, 0x0) ioctl(r8, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r9 = socket$inet(0x2, 0x803, 0xa0) connect$inet(r9, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) setsockopt$inet_mreqsrc(r9, 0x0, 0xf, 0x0, 0x0) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r10, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) r11 = socket(0x10, 0x80002, 0x0) ioctl(r11, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRES16=r8, @ANYRES64=r11, @ANYRESDEC=r10], 0x1e) 22:00:03 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffefffff00000000, 0x0, 0x0, 0x0) 22:00:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 22:00:03 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) socket$inet6_tcp(0xa, 0x1, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:03 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r7, @ANYRESHEX, @ANYRES16=r8], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r9 = gettid() waitid(0x83b895581628fca4, r9, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r10 = memfd_create(0x0, 0x0) r11 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r12 = dup2(r11, r10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r9, r12, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r13 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r13, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) r1 = semget$private(0x0, 0x7, 0x0) semop(r1, &(0x7f00000000c0)=[{0x4, 0x3, 0x1000}], 0x1) semctl$IPC_INFO(r1, 0x2, 0x3, &(0x7f00000000c0)=""/175) 22:00:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[], 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 22:00:04 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0) 22:00:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x5095, 0xc, "de868d061a6f60a8d713d9653b1ab2ff7d2fc2"}) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") fcntl$setstatus(r1, 0x4, 0x44000) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000240)="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", 0x1000}], 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 22:00:04 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) socket$inet6_tcp(0xa, 0x1, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:04 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0) 22:00:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[], 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 22:00:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x160, r2, 0x310, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x73}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1a64}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x16}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_virt_wifi\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0xc7de668480700f3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x99}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x251}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xff}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xb}}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x6044804}, 0x20000000) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 22:00:04 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r7, @ANYRESHEX, @ANYRES16=r8], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r9 = gettid() waitid(0x83b895581628fca4, r9, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r10 = memfd_create(0x0, 0x0) r11 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r12 = dup2(r11, r10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r9, r12, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r13 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r13, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[], 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 22:00:05 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) 22:00:05 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) socket$inet6_tcp(0xa, 0x1, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x2, 0x5, 0x4, 0x10000, 0x100, {0x0, 0x7530}, {0x5, 0xa, 0x40, 0x4, 0xc0, 0x0, "7aa5744c"}, 0xfd, 0x0, @fd=r1, 0x1, 0x0, 0xffffffffffffffff}) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000200)={0x2, 0x77a, 0x5}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0xfffffffffffffdc3, &(0x7f00000003c0)=""/109}) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000000)=""/37) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b259b3b00000000d977e30c6258274629777ff4f0a9636ee1412e010035a30b55da55b1e05e8fbf9e2558b64c64e8f33e23ef7803000000000000000000"], 0x32) socket$phonet(0x23, 0x2, 0x1) 22:00:05 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r7, @ANYRESHEX, @ANYRES16=r8], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r9 = gettid() waitid(0x83b895581628fca4, r9, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r10 = memfd_create(0x0, 0x0) r11 = syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) r12 = dup2(r11, r10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r9, r12, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r13 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r13, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:05 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) 22:00:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 22:00:05 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) socket$inet6_tcp(0xa, 0x1, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000000)=0xe8) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000001c0)={r2, 0x1, 0x6, @link_local}, 0x10) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="2025000000000000006d9ed977e30c6258278c6783e48c2346297709361e4ed9ef085255da55b1e05e8fbf00"/56, @ANYBLOB="7af393b0edb05f075f79664295539e466c0b60577f5c349d2fca037f1ef59442878610feb9800819b05be0a9bc2a30f04a98c4ab26ae22c8336e606d56bb1e8e85be21afcc37084d8c2e7a50746ad477c99bd825ded17bde76cdd2f17387e851c2c51f008f8164eac0f2bf71f8beaa3399327b5617edfae3cbb17f7eaf3cb73e9b287a6b4352954ffa49b6eca83a7ddc37eaf726585ec38341"], 0xd1) 22:00:06 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r7, @ANYRESHEX, @ANYRES16=r8], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r9 = gettid() waitid(0x83b895581628fca4, r9, &(0x7f0000000040), 0x2, &(0x7f0000000480)) memfd_create(0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r9, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r10}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r10}, 0x30) r11 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r11, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 22:00:06 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) socket$inet6_tcp(0xa, 0x1, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:06 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffa0006000, 0x0, 0x0, 0x0) 22:00:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d9ed977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) ioctl$TIOCNOTTY(r1, 0x5422) 22:00:06 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffa0006000, 0x0, 0x0, 0x0) 22:00:06 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) socket$inet6_tcp(0xa, 0x1, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:06 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r7, @ANYRESHEX, @ANYRES16=r8], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r9 = gettid() waitid(0x83b895581628fca4, r9, &(0x7f0000000040), 0x2, &(0x7f0000000480)) memfd_create(0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r9, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r10}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r10}, 0x30) r11 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r11, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 22:00:07 executing program 1: syz_open_dev$vcsn(0xfffffffffffffffd, 0x6, 0x40c800) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe9, 0x0, 0x0, 0xff, 0x0, 0xd1a, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x3, 0xa4b8}, 0x0, 0x0, 0xffffffffffffffff, 0x7) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b2d9b3b0000000000000100000000006d9fd977e30c6258274629777ff4f0a9636ee1412e621b35a30b55da55b1e05e8fbf"], 0x32) 22:00:07 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffff0700, 0x0, 0x0, 0x0) 22:00:07 executing program 4: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) fcntl$getownex(r5, 0x10, &(0x7f0000000580)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) socket$inet6_tcp(0xa, 0x1, 0x0) waitid(0x83b895581628fca4, 0x0, &(0x7f0000000040), 0x2, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x955d6082d9f550d1, @local}, 0x10, 0x80800) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000140), 0x8) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000580)={0x3, 0x1, 0x12, 0x1, 0x2f, &(0x7f0000000180)}) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b259b3b0000da59c864438a9cebde00ee0b000000e70000000000000088dc0000006d9ed97705000c6258274608876305a342ef6f61bdffae41d714b497302749522cffffff7f000000001543130a899bbf815fbcb8f8"], 0x32) 22:00:07 executing program 5: getpid() r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00'}, 0x30) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) pipe(&(0x7f0000000680)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) fcntl$getownex(r6, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe63456", @ANYRES16=r7, @ANYRESHEX, @ANYRES16=r8], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) r9 = gettid() waitid(0x83b895581628fca4, r9, &(0x7f0000000040), 0x2, &(0x7f0000000480)) memfd_create(0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2, 0x0, 0xffff}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r9, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r10}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r10}, 0x30) r11 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r11, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b000000000000006d9ed977e30c625827"], 0x19) 22:00:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1b259b3b0000000000000000000000006d"], 0x11) getuid() ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x19, 0xd, 0x43, &(0x7f0000001640)}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x9, 0x2, 0x1ff, 0xab, &(0x7f0000000300)=""/171, 0x1000, &(0x7f0000000640)=""/4096, 0x6d, &(0x7f00000003c0)=""/109}) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x0, 0x6, 0xfff, 0x7, 0x35, 0x6, &(0x7f0000000140)="01fc2643388235317d519dfc9e00d24f9397e11e4303bba2a14bf991926acd503759b547d300b4b87c985a24dc9f50129f91ed6739"}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b259b3b000000000b00000000"], 0xd) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x3ff, 0x2, 0x1ff, 0xb5, &(0x7f0000000440)=""/181, 0x1000, &(0x7f0000000640)=""/4096, 0x65, &(0x7f00000003c0)=""/101}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x5, 0x4, 0x0, 0x0, 0x1}, 0x3c) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x107, 0x40, 0x8, 0x1e3, 0x2a7, 0xdf7, 0xed, 0xfffffffb}, "cadaf12196c259c9fbc5403c71fb4ae00ff9e6d8f923c640dc786aa27d81b4c84fbfd6bd2cb995350031eb994d33adf6b56dd409e9716dbdae85ef179b4cda25445a1547e5bcbe831195f4006349966aa0d3c63c8789d42457e4a38f84e1b03911a021e4050fd006df5d9a9a2608b46c92d598e210f96d4fd4", [[]]}, 0x199) 22:00:07 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffff0700, 0x0, 0x0, 0x0) [ 1187.737374][T21548] ================================================================== [ 1187.737527][T21548] BUG: KASAN: global-out-of-bounds in fbcon_get_font+0x2b2/0x5e0 [ 1187.737545][T21548] Read of size 32 at addr ffffffff8873fb80 by task syz-executor.3/21548 [ 1187.737552][T21548] [ 1187.737572][T21548] CPU: 0 PID: 21548 Comm: syz-executor.3 Not tainted 5.5.0-rc5-syzkaller #0 [ 1187.737585][T21548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1187.737594][T21548] Call Trace: [ 1187.737617][T21548] dump_stack+0x197/0x210 [ 1187.737638][T21548] ? fbcon_get_font+0x2b2/0x5e0 [ 1187.737668][T21548] print_address_description.constprop.0.cold+0x5/0x30b [ 1187.737685][T21548] ? fbcon_get_font+0x2b2/0x5e0 [ 1187.737704][T21548] ? fbcon_get_font+0x2b2/0x5e0 [ 1187.737725][T21548] __kasan_report.cold+0x1b/0x41 [ 1187.737750][T21548] ? fbcon_get_font+0x2b2/0x5e0 [ 1187.737776][T21548] kasan_report+0x12/0x20 [ 1187.737797][T21548] check_memory_region+0x134/0x1a0 [ 1187.737819][T21548] memcpy+0x24/0x50 [ 1187.737841][T21548] fbcon_get_font+0x2b2/0x5e0 [ 1187.737868][T21548] ? display_to_var+0x7e0/0x7e0 [ 1187.737939][T21548] con_font_op+0x20b/0x1270 [ 1187.737964][T21548] ? lock_downgrade+0x920/0x920 [ 1187.737988][T21548] ? con_write+0xd0/0xd0 [ 1187.738035][T21548] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1187.738055][T21548] ? _copy_from_user+0x12c/0x1a0 [ 1187.738082][T21548] vt_ioctl+0x181a/0x26d0 [ 1187.738107][T21548] ? complete_change_console+0x3a0/0x3a0 [ 1187.738127][T21548] ? __lockdep_free_key_range+0x120/0x120 [ 1187.738142][T21548] ? lock_downgrade+0x920/0x920 [ 1187.738171][T21548] ? tomoyo_path_number_perm+0x214/0x520 [ 1187.738191][T21548] ? find_held_lock+0x35/0x130 [ 1187.738218][T21548] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1187.738261][T21548] ? tty_jobctrl_ioctl+0x50/0xd40 [ 1187.738280][T21548] ? complete_change_console+0x3a0/0x3a0 [ 1187.738328][T21548] tty_ioctl+0xa37/0x14f0 [ 1187.738363][T21548] ? tty_vhangup+0x30/0x30 [ 1187.738383][T21548] ? tomoyo_path_number_perm+0x454/0x520 [ 1187.738412][T21548] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1187.738433][T21548] ? tomoyo_path_number_perm+0x25e/0x520 [ 1187.738463][T21548] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1187.738483][T21548] ? perf_trace_lock+0x315/0x4c0 [ 1187.738548][T21548] ? tty_vhangup+0x30/0x30 [ 1187.738573][T21548] do_vfs_ioctl+0x977/0x14e0 [ 1187.738603][T21548] ? compat_ioctl_preallocate+0x220/0x220 [ 1187.738622][T21548] ? __fget+0x37f/0x550 [ 1187.738656][T21548] ? ksys_dup3+0x3e0/0x3e0 [ 1187.738677][T21548] ? ns_to_kernel_old_timeval+0x100/0x100 [ 1187.738711][T21548] ? tomoyo_file_ioctl+0x23/0x30 [ 1187.738732][T21548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1187.738752][T21548] ? security_file_ioctl+0x8d/0xc0 [ 1187.738779][T21548] ksys_ioctl+0xab/0xd0 [ 1187.738806][T21548] __x64_sys_ioctl+0x73/0xb0 [ 1187.738832][T21548] do_syscall_64+0xfa/0x790 [ 1187.738860][T21548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1187.738876][T21548] RIP: 0033:0x45af49 [ 1187.738895][T21548] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1187.738906][T21548] RSP: 002b:00007fd71d683c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1187.738924][T21548] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045af49 [ 1187.738936][T21548] RDX: 00000000200000c0 RSI: 0000000000004b72 RDI: 0000000000000005 [ 1187.738947][T21548] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1187.738959][T21548] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd71d6846d4 [ 1187.738971][T21548] R13: 00000000004c424b R14: 00000000004daaf0 R15: 00000000ffffffff [ 1187.739012][T21548] [ 1187.739020][T21548] The buggy address belongs to the variable: [ 1187.739083][T21548] fontdata_8x16+0x1000/0x1120 [ 1187.739091][T21548] [ 1187.739099][T21548] Memory state around the buggy address: [ 1187.739116][T21548] ffffffff8873fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1187.739132][T21548] ffffffff8873fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1187.739148][T21548] >ffffffff8873fb80: fa fa fa fa 06 fa fa fa fa fa fa fa 05 fa fa fa [ 1187.739157][T21548] ^ [ 1187.739173][T21548] ffffffff8873fc00: fa fa fa fa 06 fa fa fa fa fa fa fa 00 00 03 fa [ 1187.739189][T21548] ffffffff8873fc80: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00 [ 1187.739198][T21548] ================================================================== [ 1187.739206][T21548] Disabling lock debugging due to kernel taint [ 1187.739296][T21548] Kernel panic - not syncing: panic_on_warn set ... [ 1187.739318][T21548] CPU: 0 PID: 21548 Comm: syz-executor.3 Tainted: G B 5.5.0-rc5-syzkaller #0 [ 1187.739329][T21548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1187.739336][T21548] Call Trace: [ 1187.739362][T21548] dump_stack+0x197/0x210 [ 1187.739413][T21548] panic+0x2e3/0x75c [ 1187.739433][T21548] ? add_taint.cold+0x16/0x16 [ 1187.739455][T21548] ? fbcon_get_font+0x2b2/0x5e0 [ 1187.739478][T21548] ? preempt_schedule+0x4b/0x60 [ 1187.739497][T21548] ? ___preempt_schedule+0x16/0x18 [ 1187.739520][T21548] ? trace_hardirqs_on+0x5e/0x240 [ 1187.739542][T21548] ? fbcon_get_font+0x2b2/0x5e0 [ 1187.739560][T21548] end_report+0x47/0x4f [ 1187.739575][T21548] ? fbcon_get_font+0x2b2/0x5e0 [ 1187.739592][T21548] __kasan_report.cold+0xe/0x41 [ 1187.739613][T21548] ? fbcon_get_font+0x2b2/0x5e0 [ 1187.739635][T21548] kasan_report+0x12/0x20 [ 1187.739654][T21548] check_memory_region+0x134/0x1a0 [ 1187.739673][T21548] memcpy+0x24/0x50 [ 1187.739693][T21548] fbcon_get_font+0x2b2/0x5e0 [ 1187.739716][T21548] ? display_to_var+0x7e0/0x7e0 [ 1187.739736][T21548] con_font_op+0x20b/0x1270 [ 1187.739756][T21548] ? lock_downgrade+0x920/0x920 [ 1187.739777][T21548] ? con_write+0xd0/0xd0 [ 1187.739815][T21548] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1187.739833][T21548] ? _copy_from_user+0x12c/0x1a0 [ 1187.739856][T21548] vt_ioctl+0x181a/0x26d0 [ 1187.739878][T21548] ? complete_change_console+0x3a0/0x3a0 [ 1187.739896][T21548] ? __lockdep_free_key_range+0x120/0x120 [ 1187.739910][T21548] ? lock_downgrade+0x920/0x920 [ 1187.739934][T21548] ? tomoyo_path_number_perm+0x214/0x520 [ 1187.739952][T21548] ? find_held_lock+0x35/0x130 [ 1187.739975][T21548] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1187.739996][T21548] ? tty_jobctrl_ioctl+0x50/0xd40 [ 1187.740013][T21548] ? complete_change_console+0x3a0/0x3a0 [ 1187.740035][T21548] tty_ioctl+0xa37/0x14f0 [ 1187.740059][T21548] ? tty_vhangup+0x30/0x30 [ 1187.740076][T21548] ? tomoyo_path_number_perm+0x454/0x520 [ 1187.740101][T21548] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1187.740119][T21548] ? tomoyo_path_number_perm+0x25e/0x520 [ 1187.740144][T21548] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1187.740161][T21548] ? perf_trace_lock+0x315/0x4c0 [ 1187.740210][T21548] ? tty_vhangup+0x30/0x30 [ 1187.740231][T21548] do_vfs_ioctl+0x977/0x14e0 [ 1187.740257][T21548] ? compat_ioctl_preallocate+0x220/0x220 [ 1187.740273][T21548] ? __fget+0x37f/0x550 [ 1187.740301][T21548] ? ksys_dup3+0x3e0/0x3e0 [ 1187.740327][T21548] ? ns_to_kernel_old_timeval+0x100/0x100 [ 1187.740361][T21548] ? tomoyo_file_ioctl+0x23/0x30 [ 1187.740381][T21548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1187.740400][T21548] ? security_file_ioctl+0x8d/0xc0 [ 1187.740424][T21548] ksys_ioctl+0xab/0xd0 [ 1187.740450][T21548] __x64_sys_ioctl+0x73/0xb0 [ 1187.740471][T21548] do_syscall_64+0xfa/0x790 [ 1187.740496][T21548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1187.740509][T21548] RIP: 0033:0x45af49 [ 1187.740526][T21548] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1187.740536][T21548] RSP: 002b:00007fd71d683c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1187.740552][T21548] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045af49 [ 1187.740563][T21548] RDX: 00000000200000c0 RSI: 0000000000004b72 RDI: 0000000000000005 [ 1187.740573][T21548] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1187.740584][T21548] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd71d6846d4 [ 1187.740595][T21548] R13: 00000000004c424b R14: 00000000004daaf0 R15: 00000000ffffffff [ 1187.741952][T21548] Kernel Offset: disabled [ 1188.532867][T21548] Rebooting in 86400 seconds..