t_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:34 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) [ 301.645696] protocol 88fb is buggy, dev hsr_slave_0 [ 301.650780] protocol 88fb is buggy, dev hsr_slave_1 03:33:34 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x0, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r5, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(r4, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r6}}]}}) 03:33:34 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:34 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) [ 301.966791] protocol 88fb is buggy, dev hsr_slave_0 [ 301.972350] protocol 88fb is buggy, dev hsr_slave_1 03:33:34 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x0, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:34 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r5, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(r4, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) 03:33:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r4, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:34 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r5, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(r4, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r6}}]}}) 03:33:34 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:34 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x0, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:34 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r5, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(r4, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) [ 302.445728] protocol 88fb is buggy, dev hsr_slave_0 [ 302.450839] protocol 88fb is buggy, dev hsr_slave_1 03:33:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r4, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:34 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:35 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:35 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r5, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(r4, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r6}}]}}) 03:33:35 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x0, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:35 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:35 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r4, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:35 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:35 executing program 1 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') [ 303.026718] FAULT_INJECTION: forcing a failure. [ 303.026718] name failslab, interval 1, probability 0, space 0, times 1 [ 303.054301] CPU: 1 PID: 9869 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #84 [ 303.061506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.061513] Call Trace: [ 303.061614] dump_stack+0x172/0x1f0 [ 303.061721] should_fail.cold+0xa/0x1b [ 303.061747] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 303.086295] ? lock_downgrade+0x810/0x810 [ 303.090514] ? ___might_sleep+0x163/0x280 [ 303.090557] __should_failslab+0x121/0x190 [ 303.098933] should_failslab+0x9/0x14 [ 303.098974] kmem_cache_alloc+0x2b2/0x6f0 [ 303.106884] ? kasan_check_write+0x14/0x20 [ 303.106909] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 303.106954] ? check_preemption_disabled+0x48/0x290 [ 303.106999] getname_flags+0xd6/0x5b0 03:33:35 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:35 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) [ 303.107018] do_rmdir+0xb8/0x420 [ 303.116081] ? __ia32_sys_mkdir+0x80/0x80 [ 303.116115] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 303.116141] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 303.116157] ? do_syscall_64+0x26/0x610 [ 303.116172] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.116187] ? do_syscall_64+0x26/0x610 [ 303.116203] ? lockdep_hardirqs_on+0x415/0x5d0 [ 303.125014] __x64_sys_rmdir+0x36/0x40 [ 303.125032] do_syscall_64+0x103/0x610 [ 303.125053] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.125065] RIP: 0033:0x457e29 [ 303.125081] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.132563] RSP: 002b:00007f5f436aec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000054 [ 303.132579] RAX: ffffffffffffffda RBX: 00007f5f436aec90 RCX: 0000000000457e29 [ 303.132588] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 303.132598] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 303.132607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5f436af6d4 [ 303.132617] R13: 00000000004c4bad R14: 00000000004d8750 R15: 0000000000000004 03:33:35 executing program 5 (fault-call:1 fault-nth:0): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:35 executing program 1 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') [ 303.325715] protocol 88fb is buggy, dev hsr_slave_0 03:33:35 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r4, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:35 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) [ 303.422107] FAULT_INJECTION: forcing a failure. [ 303.422107] name failslab, interval 1, probability 0, space 0, times 0 [ 303.447981] FAULT_INJECTION: forcing a failure. [ 303.447981] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 303.459793] CPU: 1 PID: 9885 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #84 [ 303.466982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.476815] Call Trace: [ 303.479415] dump_stack+0x172/0x1f0 [ 303.483056] should_fail.cold+0xa/0x1b [ 303.486955] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 303.492139] should_fail_alloc_page+0x50/0x60 [ 303.496646] __alloc_pages_nodemask+0x1a1/0x710 [ 303.501326] ? __alloc_pages_slowpath+0x2900/0x2900 [ 303.506343] ? find_held_lock+0x35/0x130 [ 303.510430] cache_grow_begin+0x9c/0x8c0 [ 303.514526] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 303.520072] ? check_preemption_disabled+0x48/0x290 [ 303.525099] kmem_cache_alloc+0x62d/0x6f0 [ 303.529258] ? kasan_check_write+0x14/0x20 [ 303.533496] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 303.538355] getname_flags+0xd6/0x5b0 [ 303.542169] do_rmdir+0xb8/0x420 [ 303.545549] ? __ia32_sys_mkdir+0x80/0x80 [ 303.549705] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 303.554467] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 303.559226] ? do_syscall_64+0x26/0x610 [ 303.563207] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.568578] ? do_syscall_64+0x26/0x610 [ 303.573013] ? lockdep_hardirqs_on+0x415/0x5d0 [ 303.577604] __x64_sys_rmdir+0x36/0x40 [ 303.581495] do_syscall_64+0x103/0x610 [ 303.585390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.590579] RIP: 0033:0x457e29 [ 303.593774] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.612676] RSP: 002b:00007f5f4368dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000054 03:33:35 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) [ 303.620386] RAX: ffffffffffffffda RBX: 00007f5f4368dc90 RCX: 0000000000457e29 [ 303.627660] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 303.634933] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 303.642200] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5f4368e6d4 [ 303.649468] R13: 00000000004c4bad R14: 00000000004d8750 R15: 0000000000000004 [ 303.696126] CPU: 1 PID: 9879 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #84 [ 303.703364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.712733] Call Trace: [ 303.715344] dump_stack+0x172/0x1f0 [ 303.718995] should_fail.cold+0xa/0x1b [ 303.722913] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 303.728031] ? lock_downgrade+0x810/0x810 [ 303.732190] ? ___might_sleep+0x163/0x280 [ 303.736347] __should_failslab+0x121/0x190 [ 303.740588] should_failslab+0x9/0x14 [ 303.744391] kmem_cache_alloc_node+0x264/0x710 [ 303.749072] __alloc_skb+0xd5/0x5e0 [ 303.752711] ? skb_scrub_packet+0x440/0x440 [ 303.757043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.762630] ? netlink_autobind.isra.0+0x228/0x310 [ 303.767578] netlink_sendmsg+0x97b/0xd70 [ 303.772163] ? netlink_unicast+0x720/0x720 [ 303.776474] ? smack_socket_sendmsg+0xb1/0x1a0 [ 303.781068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.786669] ? security_socket_sendmsg+0x93/0xc0 [ 303.791432] ? netlink_unicast+0x720/0x720 [ 303.795701] sock_sendmsg+0xdd/0x130 [ 303.799429] ___sys_sendmsg+0x806/0x930 [ 303.803412] ? copy_msghdr_from_user+0x430/0x430 [ 303.808181] ? lock_downgrade+0x810/0x810 [ 303.812348] ? kasan_check_read+0x11/0x20 [ 303.816532] ? __fget+0x367/0x540 [ 303.820011] ? iterate_fd+0x360/0x360 [ 303.823811] ? lock_downgrade+0x810/0x810 [ 303.827977] ? __fget_light+0x1a9/0x230 [ 303.831957] ? __fdget+0x1b/0x20 [ 303.835324] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 303.840872] __sys_sendmsg+0x105/0x1d0 [ 303.844771] ? __ia32_sys_shutdown+0x80/0x80 [ 303.849202] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 303.854773] ? fput+0x128/0x1a0 [ 303.858076] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 303.862859] ? do_syscall_64+0x26/0x610 [ 303.866836] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.872657] ? do_syscall_64+0x26/0x610 [ 303.876646] __x64_sys_sendmsg+0x78/0xb0 [ 303.880713] do_syscall_64+0x103/0x610 [ 303.884608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.889801] RIP: 0033:0x457e29 [ 303.892997] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.911895] RSP: 002b:00007f2b2139bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 303.919613] RAX: ffffffffffffffda RBX: 00007f2b2139bc90 RCX: 0000000000457e29 [ 303.926881] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 303.934160] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 303.941448] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2b2139c6d4 [ 303.948718] R13: 00000000004c4e20 R14: 00000000004d8b88 R15: 0000000000000004 03:33:36 executing program 1 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:36 executing program 5 (fault-call:1 fault-nth:1): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:36 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) [ 304.100884] FAULT_INJECTION: forcing a failure. [ 304.100884] name failslab, interval 1, probability 0, space 0, times 0 [ 304.121232] CPU: 0 PID: 9899 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #84 [ 304.128434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.137785] Call Trace: [ 304.140388] dump_stack+0x172/0x1f0 [ 304.144037] should_fail.cold+0xa/0x1b [ 304.147937] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 304.153049] ? lock_downgrade+0x810/0x810 [ 304.157227] ? ___might_sleep+0x163/0x280 [ 304.161398] __should_failslab+0x121/0x190 [ 304.165889] should_failslab+0x9/0x14 [ 304.169757] kmem_cache_alloc_node_trace+0x270/0x720 [ 304.174899] ? __alloc_skb+0xd5/0x5e0 [ 304.178764] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 304.184230] __kmalloc_node_track_caller+0x3d/0x70 [ 304.189177] __kmalloc_reserve.isra.0+0x40/0xf0 [ 304.193856] __alloc_skb+0x10b/0x5e0 [ 304.197576] ? skb_scrub_packet+0x440/0x440 [ 304.201904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.207448] ? netlink_autobind.isra.0+0x228/0x310 [ 304.212392] netlink_sendmsg+0x97b/0xd70 [ 304.216472] ? netlink_unicast+0x720/0x720 [ 304.220719] ? smack_socket_sendmsg+0xb1/0x1a0 [ 304.225308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.230854] ? security_socket_sendmsg+0x93/0xc0 [ 304.235619] ? netlink_unicast+0x720/0x720 [ 304.239861] sock_sendmsg+0xdd/0x130 [ 304.243581] ___sys_sendmsg+0x806/0x930 [ 304.247562] ? copy_msghdr_from_user+0x430/0x430 [ 304.252331] ? lock_downgrade+0x810/0x810 [ 304.256487] ? kasan_check_read+0x11/0x20 [ 304.260647] ? __fget+0x367/0x540 [ 304.264115] ? iterate_fd+0x360/0x360 [ 304.267928] ? lock_downgrade+0x810/0x810 [ 304.272098] ? __fget_light+0x1a9/0x230 [ 304.276087] ? __fdget+0x1b/0x20 [ 304.279455] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 304.285006] __sys_sendmsg+0x105/0x1d0 [ 304.288898] ? __ia32_sys_shutdown+0x80/0x80 [ 304.293311] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 304.298849] ? fput+0x128/0x1a0 [ 304.302155] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 304.306917] ? do_syscall_64+0x26/0x610 [ 304.310899] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.316263] ? do_syscall_64+0x26/0x610 [ 304.320252] __x64_sys_sendmsg+0x78/0xb0 [ 304.324324] do_syscall_64+0x103/0x610 [ 304.328226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.333421] RIP: 0033:0x457e29 03:33:36 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r4, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) [ 304.336616] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.355520] RSP: 002b:00007f2b2139bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 304.363234] RAX: ffffffffffffffda RBX: 00007f2b2139bc90 RCX: 0000000000457e29 [ 304.370504] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 304.377772] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 304.385038] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2b2139c6d4 [ 304.392313] R13: 00000000004c4e20 R14: 00000000004d8b88 R15: 0000000000000004 03:33:36 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:36 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:36 executing program 5 (fault-call:1 fault-nth:2): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:37 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') [ 304.591015] FAULT_INJECTION: forcing a failure. [ 304.591015] name failslab, interval 1, probability 0, space 0, times 0 [ 304.628595] CPU: 0 PID: 9914 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #84 [ 304.635804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.645160] Call Trace: [ 304.645190] dump_stack+0x172/0x1f0 [ 304.645219] should_fail.cold+0xa/0x1b [ 304.651420] ? __netlink_lookup+0x3c8/0x7a0 [ 304.651439] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 304.651459] ? netlink_deliver_tap+0x146/0xbf0 [ 304.659646] __should_failslab+0x121/0x190 [ 304.659665] should_failslab+0x9/0x14 [ 304.659680] kmem_cache_alloc+0x47/0x6f0 [ 304.659697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.659712] ? check_preemption_disabled+0x48/0x290 [ 304.659728] ? lock_acquire+0x16f/0x3f0 [ 304.669394] skb_clone+0x150/0x3b0 [ 304.669454] netlink_deliver_tap+0x952/0xbf0 [ 304.677955] netlink_unicast+0x5a7/0x720 [ 304.677978] ? netlink_attachskb+0x770/0x770 [ 304.677993] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 304.678060] ? __check_object_size+0x3d/0x42f [ 304.678081] netlink_sendmsg+0x8ae/0xd70 [ 304.687672] ? netlink_unicast+0x720/0x720 [ 304.687696] ? smack_socket_sendmsg+0xb1/0x1a0 [ 304.687712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.687729] ? security_socket_sendmsg+0x93/0xc0 [ 304.687746] ? netlink_unicast+0x720/0x720 [ 304.696716] sock_sendmsg+0xdd/0x130 [ 304.696735] ___sys_sendmsg+0x806/0x930 [ 304.696754] ? copy_msghdr_from_user+0x430/0x430 [ 304.696774] ? lock_downgrade+0x810/0x810 [ 304.696793] ? kasan_check_read+0x11/0x20 [ 304.704724] ? __fget+0x367/0x540 [ 304.704744] ? iterate_fd+0x360/0x360 [ 304.704757] ? lock_downgrade+0x810/0x810 [ 304.704779] ? __fget_light+0x1a9/0x230 [ 304.713214] ? __fdget+0x1b/0x20 [ 304.713229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 304.713255] __sys_sendmsg+0x105/0x1d0 [ 304.713271] ? __ia32_sys_shutdown+0x80/0x80 [ 304.722758] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 304.722774] ? fput+0x128/0x1a0 [ 304.722800] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 304.722816] ? do_syscall_64+0x26/0x610 [ 304.731104] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.731119] ? do_syscall_64+0x26/0x610 [ 304.731169] __x64_sys_sendmsg+0x78/0xb0 [ 304.741371] do_syscall_64+0x103/0x610 [ 304.741390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.741408] RIP: 0033:0x457e29 [ 304.741424] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.750409] RSP: 002b:00007f2b2139bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 304.873109] RAX: ffffffffffffffda RBX: 00007f2b2139bc90 RCX: 0000000000457e29 [ 304.880369] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 304.887633] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 304.894882] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2b2139c6d4 [ 304.902165] R13: 00000000004c4e20 R14: 00000000004d8b88 R15: 0000000000000004 03:33:37 executing program 5 (fault-call:1 fault-nth:3): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 304.989549] FAULT_INJECTION: forcing a failure. [ 304.989549] name failslab, interval 1, probability 0, space 0, times 0 [ 305.000981] CPU: 0 PID: 9927 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #84 [ 305.008162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.017513] Call Trace: [ 305.020111] dump_stack+0x172/0x1f0 [ 305.023761] should_fail.cold+0xa/0x1b [ 305.027659] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 305.032820] ? __kernel_text_address+0xd/0x40 [ 305.037351] ? unwind_get_return_address+0x61/0xa0 [ 305.042293] __should_failslab+0x121/0x190 [ 305.046535] should_failslab+0x9/0x14 [ 305.050335] kmem_cache_alloc+0x47/0x6f0 [ 305.054399] ? check_preemption_disabled+0x48/0x290 [ 305.059430] ? lock_acquire+0x16f/0x3f0 [ 305.063424] skb_clone+0x150/0x3b0 [ 305.067009] dev_queue_xmit_nit+0x2f0/0x980 [ 305.071377] ? validate_xmit_xfrm+0x42d/0xf30 [ 305.075893] dev_hard_start_xmit+0xbb/0x980 [ 305.080219] ? check_preemption_disabled+0x48/0x290 [ 305.085260] __dev_queue_xmit+0x26e5/0x2fe0 [ 305.089586] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.095145] ? netdev_pick_tx+0x300/0x300 [ 305.099297] ? __copy_skb_header+0x2d0/0x570 [ 305.103710] ? __skb_checksum_complete+0x3f0/0x3f0 [ 305.108644] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 305.114123] ? skb_clone+0x150/0x3b0 [ 305.117854] ? rcu_read_lock_sched_held+0x110/0x130 [ 305.122876] ? kasan_check_write+0x14/0x20 [ 305.127111] ? __skb_clone+0x5c8/0x820 [ 305.131013] dev_queue_xmit+0x18/0x20 [ 305.134816] ? dev_queue_xmit+0x18/0x20 [ 305.138799] netlink_deliver_tap+0x8e7/0xbf0 [ 305.143226] netlink_unicast+0x5a7/0x720 [ 305.147297] ? netlink_attachskb+0x770/0x770 [ 305.151707] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 305.156729] ? __check_object_size+0x3d/0x42f [ 305.161237] netlink_sendmsg+0x8ae/0xd70 [ 305.165567] ? netlink_unicast+0x720/0x720 [ 305.169921] ? smack_socket_sendmsg+0xb1/0x1a0 [ 305.174542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.180088] ? security_socket_sendmsg+0x93/0xc0 [ 305.184846] ? netlink_unicast+0x720/0x720 [ 305.189106] sock_sendmsg+0xdd/0x130 [ 305.192837] ___sys_sendmsg+0x806/0x930 [ 305.196822] ? copy_msghdr_from_user+0x430/0x430 [ 305.201587] ? lock_downgrade+0x810/0x810 [ 305.205750] ? kasan_check_read+0x11/0x20 [ 305.209948] ? __fget+0x367/0x540 [ 305.213416] ? iterate_fd+0x360/0x360 [ 305.217218] ? lock_downgrade+0x810/0x810 [ 305.221382] ? __fget_light+0x1a9/0x230 [ 305.225366] ? __fdget+0x1b/0x20 [ 305.228735] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 305.234281] __sys_sendmsg+0x105/0x1d0 [ 305.238191] ? __ia32_sys_shutdown+0x80/0x80 [ 305.243224] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 305.248763] ? fput+0x128/0x1a0 [ 305.252062] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 305.256820] ? do_syscall_64+0x26/0x610 [ 305.260800] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.266173] ? do_syscall_64+0x26/0x610 [ 305.270170] __x64_sys_sendmsg+0x78/0xb0 [ 305.274246] do_syscall_64+0x103/0x610 [ 305.278164] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.283387] RIP: 0033:0x457e29 [ 305.286592] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.305648] RSP: 002b:00007f2b2139bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 305.313362] RAX: ffffffffffffffda RBX: 00007f2b2139bc90 RCX: 0000000000457e29 [ 305.320629] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 305.327899] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 305.335171] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2b2139c6d4 [ 305.342438] R13: 00000000004c4e20 R14: 00000000004d8b88 R15: 0000000000000004 03:33:37 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:37 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r4, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:37 executing program 5 (fault-call:1 fault-nth:4): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:37 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:semanage_read_lock_t:s0\x00', 0x2a, 0x1) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000200)=0x4, &(0x7f0000000240)=0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') rmdir(&(0x7f0000000340)='./file0//ile0\x00') socket$inet6_sctp(0xa, 0x5, 0x84) 03:33:38 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x0, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) [ 305.618441] FAULT_INJECTION: forcing a failure. [ 305.618441] name failslab, interval 1, probability 0, space 0, times 0 [ 305.647556] CPU: 1 PID: 9942 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #84 [ 305.654765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.664113] Call Trace: [ 305.664151] dump_stack+0x172/0x1f0 [ 305.664178] should_fail.cold+0xa/0x1b [ 305.664201] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 305.664222] ? lock_downgrade+0x810/0x810 [ 305.684078] ? ___might_sleep+0x163/0x280 [ 305.688238] __should_failslab+0x121/0x190 [ 305.692502] should_failslab+0x9/0x14 [ 305.692533] kmem_cache_alloc_node+0x264/0x710 [ 305.692550] ? netdev_run_todo+0x5ea/0x7d0 [ 305.692575] __alloc_skb+0xd5/0x5e0 [ 305.692594] ? skb_scrub_packet+0x440/0x440 [ 305.705210] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 305.705227] ? neigh_timer_handler+0xc40/0xc40 [ 305.705251] netlink_ack+0x25c/0xb50 [ 305.705273] ? netlink_sendmsg+0xd70/0xd70 [ 305.705290] ? netlink_deliver_tap+0x22d/0xbf0 [ 305.713224] ? find_held_lock+0x35/0x130 [ 305.713247] netlink_rcv_skb+0x379/0x460 [ 305.713321] ? rtnetlink_put_metrics+0x560/0x560 [ 305.713341] ? netlink_ack+0xb50/0xb50 [ 305.727173] ? kasan_check_read+0x11/0x20 [ 305.727196] ? netlink_deliver_tap+0x254/0xbf0 [ 305.727219] rtnetlink_rcv+0x1d/0x30 [ 305.727235] netlink_unicast+0x536/0x720 [ 305.727258] ? netlink_attachskb+0x770/0x770 [ 305.727273] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 305.727294] ? __check_object_size+0x3d/0x42f [ 305.744203] netlink_sendmsg+0x8ae/0xd70 [ 305.744230] ? netlink_unicast+0x720/0x720 [ 305.744253] ? smack_socket_sendmsg+0xb1/0x1a0 [ 305.744272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.757059] ? security_socket_sendmsg+0x93/0xc0 [ 305.757077] ? netlink_unicast+0x720/0x720 [ 305.757096] sock_sendmsg+0xdd/0x130 [ 305.757115] ___sys_sendmsg+0x806/0x930 [ 305.757146] ? copy_msghdr_from_user+0x430/0x430 [ 305.757170] ? lock_downgrade+0x810/0x810 [ 305.757190] ? kasan_check_read+0x11/0x20 [ 305.757211] ? __fget+0x367/0x540 [ 305.757232] ? iterate_fd+0x360/0x360 [ 305.757245] ? lock_downgrade+0x810/0x810 [ 305.757269] ? __fget_light+0x1a9/0x230 [ 305.783831] ? __fdget+0x1b/0x20 [ 305.783847] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 305.783870] __sys_sendmsg+0x105/0x1d0 [ 305.783888] ? __ia32_sys_shutdown+0x80/0x80 [ 305.783915] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 305.796758] ? fput+0x128/0x1a0 [ 305.796786] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 305.796802] ? do_syscall_64+0x26/0x610 [ 305.796819] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.796834] ? do_syscall_64+0x26/0x610 [ 305.796857] __x64_sys_sendmsg+0x78/0xb0 [ 305.796875] do_syscall_64+0x103/0x610 [ 305.796896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.796915] RIP: 0033:0x457e29 [ 305.796931] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.796943] RSP: 002b:00007f2b2139bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 305.819128] RAX: ffffffffffffffda RBX: 00007f2b2139bc90 RCX: 0000000000457e29 [ 305.819149] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 305.949285] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 305.956569] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2b2139c6d4 03:33:38 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) [ 305.963834] R13: 00000000004c4e20 R14: 00000000004d8b88 R15: 0000000000000004 03:33:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000040)=0x100) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000000c0)={0x1, 0xffffffffffffffa8, 0xb9, 0x8, 0xffffffffffffffff, 0x1}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:38 executing program 5 (fault-call:1 fault-nth:5): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:38 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r4, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:38 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) [ 306.153566] FAULT_INJECTION: forcing a failure. [ 306.153566] name failslab, interval 1, probability 0, space 0, times 0 [ 306.181790] CPU: 0 PID: 9965 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #84 [ 306.188990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.198324] Call Trace: [ 306.200903] dump_stack+0x172/0x1f0 [ 306.204522] should_fail.cold+0xa/0x1b [ 306.208398] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 306.213491] ? find_held_lock+0x35/0x130 [ 306.217542] ? netlink_deliver_tap+0x146/0xbf0 [ 306.222112] __should_failslab+0x121/0x190 [ 306.226340] should_failslab+0x9/0x14 [ 306.230142] kmem_cache_alloc+0x47/0x6f0 [ 306.234201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.239724] ? check_preemption_disabled+0x48/0x290 [ 306.244723] ? lock_acquire+0x16f/0x3f0 [ 306.248685] skb_clone+0x150/0x3b0 [ 306.252211] netlink_deliver_tap+0x952/0xbf0 [ 306.256608] __netlink_sendskb+0x63/0xd0 [ 306.260664] netlink_unicast+0x60f/0x720 [ 306.264727] ? netlink_attachskb+0x770/0x770 [ 306.269154] netlink_ack+0x607/0xb50 [ 306.272857] ? netlink_sendmsg+0xd70/0xd70 [ 306.277075] ? netlink_deliver_tap+0x22d/0xbf0 [ 306.281643] ? find_held_lock+0x35/0x130 [ 306.285708] netlink_rcv_skb+0x379/0x460 [ 306.289759] ? rtnetlink_put_metrics+0x560/0x560 [ 306.294499] ? netlink_ack+0xb50/0xb50 [ 306.298372] ? kasan_check_read+0x11/0x20 [ 306.302683] ? netlink_deliver_tap+0x254/0xbf0 [ 306.307250] rtnetlink_rcv+0x1d/0x30 [ 306.310960] netlink_unicast+0x536/0x720 [ 306.315024] ? netlink_attachskb+0x770/0x770 [ 306.319435] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 306.324459] ? __check_object_size+0x3d/0x42f [ 306.328941] netlink_sendmsg+0x8ae/0xd70 [ 306.332992] ? netlink_unicast+0x720/0x720 [ 306.337217] ? smack_socket_sendmsg+0xb1/0x1a0 [ 306.341793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.347329] ? security_socket_sendmsg+0x93/0xc0 [ 306.352083] ? netlink_unicast+0x720/0x720 [ 306.356429] sock_sendmsg+0xdd/0x130 [ 306.360174] ___sys_sendmsg+0x806/0x930 [ 306.364144] ? copy_msghdr_from_user+0x430/0x430 [ 306.368901] ? lock_downgrade+0x810/0x810 [ 306.373040] ? kasan_check_read+0x11/0x20 [ 306.377173] ? __fget+0x367/0x540 [ 306.380610] ? iterate_fd+0x360/0x360 [ 306.384393] ? lock_downgrade+0x810/0x810 [ 306.388533] ? __fget_light+0x1a9/0x230 [ 306.392493] ? __fdget+0x1b/0x20 [ 306.395843] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 306.401366] __sys_sendmsg+0x105/0x1d0 [ 306.405248] ? __ia32_sys_shutdown+0x80/0x80 [ 306.409654] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 306.415188] ? fput+0x128/0x1a0 [ 306.418460] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 306.423205] ? do_syscall_64+0x26/0x610 [ 306.427164] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.432513] ? do_syscall_64+0x26/0x610 [ 306.436475] __x64_sys_sendmsg+0x78/0xb0 [ 306.440520] do_syscall_64+0x103/0x610 [ 306.444392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.449570] RIP: 0033:0x457e29 [ 306.452756] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.471668] RSP: 002b:00007f2b2139bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 306.479358] RAX: ffffffffffffffda RBX: 00007f2b2139bc90 RCX: 0000000000457e29 [ 306.486616] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 306.493895] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 306.501154] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2b2139c6d4 [ 306.508422] R13: 00000000004c4e20 R14: 00000000004d8b88 R15: 0000000000000004 03:33:38 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:39 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x0, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:39 executing program 5 (fault-call:1 fault-nth:6): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40, 0x0) sendto$unix(r0, &(0x7f00000000c0)="3851609ced9e90affb885722c36c6ef9752f7bee8dac2e35d24e7957fa47a0b640042034808c9446d51a8c153f33bd32a6a3e1cdb27b0a148725c2e9c9e752d3226b2d180f9d00805e3a1382d36ad5b362f7bd1046ccc6bb5e", 0x59, 0x40000, &(0x7f0000000200)=@file={0x0, './file0//ile0\x00'}, 0x6e) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000040)={0x3ff, 0x101, 0x4540}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') [ 306.605687] net_ratelimit: 13 callbacks suppressed [ 306.605694] protocol 88fb is buggy, dev hsr_slave_0 [ 306.615739] protocol 88fb is buggy, dev hsr_slave_1 [ 306.692079] FAULT_INJECTION: forcing a failure. [ 306.692079] name failslab, interval 1, probability 0, space 0, times 0 [ 306.703416] CPU: 0 PID: 9976 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #84 [ 306.710613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.720021] Call Trace: [ 306.722694] dump_stack+0x172/0x1f0 [ 306.726378] should_fail.cold+0xa/0x1b [ 306.730288] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 306.735416] ? __kernel_text_address+0xd/0x40 [ 306.739917] ? unwind_get_return_address+0x61/0xa0 [ 306.744875] __should_failslab+0x121/0x190 [ 306.749116] should_failslab+0x9/0x14 [ 306.752927] kmem_cache_alloc+0x47/0x6f0 [ 306.756993] ? check_preemption_disabled+0x48/0x290 [ 306.762012] ? lock_acquire+0x16f/0x3f0 [ 306.766004] skb_clone+0x150/0x3b0 [ 306.769556] dev_queue_xmit_nit+0x2f0/0x980 [ 306.773885] ? validate_xmit_xfrm+0x42d/0xf30 [ 306.778397] dev_hard_start_xmit+0xbb/0x980 [ 306.782728] ? check_preemption_disabled+0x48/0x290 [ 306.787757] __dev_queue_xmit+0x26e5/0x2fe0 [ 306.792094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.797657] ? should_fail+0x14d/0x85c [ 306.801553] ? netdev_pick_tx+0x300/0x300 [ 306.805705] ? __copy_skb_header+0x2ec/0x570 [ 306.810155] ? __skb_checksum_complete+0x3f0/0x3f0 [ 306.815188] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 306.820638] ? skb_clone+0x150/0x3b0 [ 306.824366] ? rcu_read_lock_sched_held+0x110/0x130 [ 306.829437] ? kasan_check_write+0x14/0x20 [ 306.833675] ? __skb_clone+0x5c8/0x820 [ 306.837576] dev_queue_xmit+0x18/0x20 [ 306.841381] ? dev_queue_xmit+0x18/0x20 [ 306.845366] netlink_deliver_tap+0x8e7/0xbf0 [ 306.849847] __netlink_sendskb+0x63/0xd0 [ 306.853913] netlink_unicast+0x60f/0x720 [ 306.857982] ? netlink_attachskb+0x770/0x770 [ 306.862408] netlink_ack+0x607/0xb50 [ 306.866129] ? netlink_sendmsg+0xd70/0xd70 [ 306.870394] ? netlink_deliver_tap+0x22d/0xbf0 [ 306.874988] ? find_held_lock+0x35/0x130 [ 306.879058] netlink_rcv_skb+0x379/0x460 [ 306.883126] ? rtnetlink_put_metrics+0x560/0x560 [ 306.887928] ? netlink_ack+0xb50/0xb50 [ 306.891819] ? kasan_check_read+0x11/0x20 [ 306.896019] ? netlink_deliver_tap+0x254/0xbf0 [ 306.900629] rtnetlink_rcv+0x1d/0x30 [ 306.904361] netlink_unicast+0x536/0x720 [ 306.908465] ? netlink_attachskb+0x770/0x770 [ 306.912898] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 306.917916] ? __check_object_size+0x3d/0x42f [ 306.922430] netlink_sendmsg+0x8ae/0xd70 [ 306.926507] ? netlink_unicast+0x720/0x720 [ 306.930752] ? smack_socket_sendmsg+0xb1/0x1a0 [ 306.935338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.940880] ? security_socket_sendmsg+0x93/0xc0 [ 306.945651] ? netlink_unicast+0x720/0x720 [ 306.949907] sock_sendmsg+0xdd/0x130 [ 306.953645] ___sys_sendmsg+0x806/0x930 [ 306.957629] ? copy_msghdr_from_user+0x430/0x430 [ 306.962394] ? lock_downgrade+0x810/0x810 [ 306.966553] ? kasan_check_read+0x11/0x20 [ 306.970707] ? __fget+0x367/0x540 [ 306.974175] ? iterate_fd+0x360/0x360 [ 306.977974] ? lock_downgrade+0x810/0x810 [ 306.982148] ? __fget_light+0x1a9/0x230 [ 306.986128] ? __fdget+0x1b/0x20 [ 306.989504] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 306.995051] __sys_sendmsg+0x105/0x1d0 [ 306.998942] ? __ia32_sys_shutdown+0x80/0x80 [ 307.003354] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 307.008892] ? fput+0x128/0x1a0 [ 307.012188] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 307.016944] ? do_syscall_64+0x26/0x610 [ 307.020919] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.026286] ? do_syscall_64+0x26/0x610 [ 307.030270] __x64_sys_sendmsg+0x78/0xb0 [ 307.034351] do_syscall_64+0x103/0x610 [ 307.038411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.043598] RIP: 0033:0x457e29 [ 307.046794] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.065692] RSP: 002b:00007f2b2139bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 307.073417] RAX: ffffffffffffffda RBX: 00007f2b2139bc90 RCX: 0000000000457e29 [ 307.080707] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 307.087975] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 307.095244] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2b2139c6d4 [ 307.102526] R13: 00000000004c4e20 R14: 00000000004d8b88 R15: 0000000000000004 03:33:39 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r4, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:39 executing program 5 (fault-call:1 fault-nth:7): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:39 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) [ 307.310820] FAULT_INJECTION: forcing a failure. [ 307.310820] name failslab, interval 1, probability 0, space 0, times 0 [ 307.322120] CPU: 1 PID: 9992 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #84 [ 307.322145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.322152] Call Trace: [ 307.322179] dump_stack+0x172/0x1f0 [ 307.322202] should_fail.cold+0xa/0x1b [ 307.322223] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 307.322246] ? perf_trace_lock+0x510/0x510 [ 307.322268] __should_failslab+0x121/0x190 [ 307.362914] should_failslab+0x9/0x14 [ 307.366725] kmem_cache_alloc+0x47/0x6f0 [ 307.370795] ? check_preemption_disabled+0x48/0x290 [ 307.375815] ? lock_acquire+0x16f/0x3f0 [ 307.379808] skb_clone+0x150/0x3b0 [ 307.383369] dev_queue_xmit_nit+0x2f0/0x980 [ 307.387701] ? validate_xmit_xfrm+0x42d/0xf30 [ 307.392211] dev_hard_start_xmit+0xbb/0x980 [ 307.396547] ? check_preemption_disabled+0x48/0x290 [ 307.401574] __dev_queue_xmit+0x26e5/0x2fe0 [ 307.405902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.405926] ? should_fail+0x14d/0x85c [ 307.405947] ? netdev_pick_tx+0x300/0x300 [ 307.405964] ? __copy_skb_header+0x2ec/0x570 [ 307.405982] ? __skb_checksum_complete+0x3f0/0x3f0 [ 307.406000] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 307.406014] ? skb_clone+0x150/0x3b0 [ 307.406028] ? rcu_read_lock_sched_held+0x110/0x130 [ 307.406077] ? kasan_check_write+0x14/0x20 [ 307.406091] ? __skb_clone+0x5c8/0x820 [ 307.406113] dev_queue_xmit+0x18/0x20 [ 307.406125] ? dev_queue_xmit+0x18/0x20 [ 307.406153] netlink_deliver_tap+0x8e7/0xbf0 [ 307.406181] __netlink_sendskb+0x63/0xd0 [ 307.406199] netlink_unicast+0x60f/0x720 [ 307.406222] ? netlink_attachskb+0x770/0x770 [ 307.406248] netlink_ack+0x607/0xb50 [ 307.406270] ? netlink_sendmsg+0xd70/0xd70 [ 307.406287] ? netlink_deliver_tap+0x22d/0xbf0 [ 307.438846] ? find_held_lock+0x35/0x130 [ 307.438870] netlink_rcv_skb+0x379/0x460 [ 307.438889] ? rtnetlink_put_metrics+0x560/0x560 [ 307.438915] ? netlink_ack+0xb50/0xb50 [ 307.438934] ? kasan_check_read+0x11/0x20 [ 307.448201] ? netlink_deliver_tap+0x254/0xbf0 [ 307.448223] rtnetlink_rcv+0x1d/0x30 [ 307.448267] netlink_unicast+0x536/0x720 [ 307.448289] ? netlink_attachskb+0x770/0x770 [ 307.448332] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 307.448363] ? __check_object_size+0x3d/0x42f [ 307.448398] netlink_sendmsg+0x8ae/0xd70 [ 307.448420] ? netlink_unicast+0x720/0x720 [ 307.448442] ? smack_socket_sendmsg+0xb1/0x1a0 [ 307.448457] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.448474] ? security_socket_sendmsg+0x93/0xc0 [ 307.448488] ? netlink_unicast+0x720/0x720 [ 307.448505] sock_sendmsg+0xdd/0x130 [ 307.448521] ___sys_sendmsg+0x806/0x930 [ 307.480855] ? copy_msghdr_from_user+0x430/0x430 [ 307.485706] protocol 88fb is buggy, dev hsr_slave_0 [ 307.489669] ? lock_downgrade+0x810/0x810 [ 307.489691] ? kasan_check_read+0x11/0x20 [ 307.489710] ? __fget+0x367/0x540 [ 307.493793] protocol 88fb is buggy, dev hsr_slave_1 [ 307.497814] ? iterate_fd+0x360/0x360 [ 307.497828] ? lock_downgrade+0x810/0x810 [ 307.497851] ? __fget_light+0x1a9/0x230 03:33:39 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) [ 307.527341] ? __fdget+0x1b/0x20 [ 307.527357] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 307.527381] __sys_sendmsg+0x105/0x1d0 [ 307.527400] ? __ia32_sys_shutdown+0x80/0x80 [ 307.527415] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 307.527430] ? fput+0x128/0x1a0 [ 307.527456] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 307.527472] ? do_syscall_64+0x26/0x610 [ 307.527490] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.545763] ? do_syscall_64+0x26/0x610 [ 307.545787] __x64_sys_sendmsg+0x78/0xb0 03:33:40 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000480)={{0x4, 0x1, 0x101, 0x3, 'syz1\x00', 0x6}, 0x0, [0x3, 0x9, 0x3f, 0xc1, 0x200, 0x9b, 0x1000, 0xfffffffffffffeff, 0x2, 0x68201165, 0x4, 0x4, 0x6, 0x1f, 0x2ee, 0xc15, 0xfffffffffffff258, 0x0, 0x1, 0xfffffffffffffffc, 0x0, 0x100000001, 0x1, 0x3, 0x1000, 0x7, 0x2, 0x5, 0x2, 0x1, 0x1, 0x1, 0x1, 0x7, 0x100000001, 0x7, 0x5, 0x7b7c, 0x0, 0x2, 0xa2, 0x8, 0xff, 0x800, 0x80000001, 0x81, 0x3, 0x10000, 0x2, 0x8001, 0x4, 0x1, 0x0, 0x98, 0x1, 0xffffffffffffff23, 0x10000, 0x3, 0x1f, 0x9, 0x6, 0xff, 0x2, 0xe80, 0x1f, 0x4, 0x7f, 0x3f, 0x1, 0x5, 0xffff, 0x74b7, 0x100000000, 0xffffffffffffffff, 0x9, 0x4, 0x0, 0x4e, 0x8, 0xfffffffffffff800, 0x100, 0x1, 0x1, 0x6, 0xc23f, 0x10001, 0x9c03, 0x9, 0x10000, 0x100, 0x4, 0x100000001, 0x101, 0x40, 0x1, 0x1, 0xdf4, 0xb4, 0x3, 0x7fffffff, 0x80000001, 0x3, 0x7fffffff, 0x8, 0xfffffffffffff189, 0xffffffffffffff80, 0x6af, 0x7, 0x2, 0x3, 0x4, 0x8, 0x4, 0x2, 0x1, 0xfffffffffffffffe, 0x100, 0x1000, 0x100000000, 0x20, 0x88, 0xfffffffffffffff8, 0x81, 0x100000000, 0xe124, 0x2, 0x1000, 0x1], {0x0, 0x1c9c380}}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') [ 307.545805] do_syscall_64+0x103/0x610 [ 307.545826] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.545837] RIP: 0033:0x457e29 [ 307.545856] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.572574] RSP: 002b:00007f2b2139bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 307.594034] RAX: ffffffffffffffda RBX: 00007f2b2139bc90 RCX: 0000000000457e29 [ 307.619788] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 307.619798] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 307.619808] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2b2139c6d4 [ 307.619818] R13: 00000000004c4e20 R14: 00000000004d8b88 R15: 0000000000000004 [ 307.620062] protocol 88fb is buggy, dev hsr_slave_0 [ 307.633748] protocol 88fb is buggy, dev hsr_slave_1 03:33:40 executing program 5 (fault-call:1 fault-nth:8): r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:40 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:40 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:40 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x0, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:40 executing program 1: mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0xf5) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x101000, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000140)='./file0//ile0\x00') 03:33:40 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:40 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r4, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:40 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 308.205701] protocol 88fb is buggy, dev hsr_slave_0 [ 308.210797] protocol 88fb is buggy, dev hsr_slave_1 03:33:40 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:40 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:40 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:40 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:40 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xdbfc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') dup(r0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x80000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000040)=0x5) 03:33:40 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:40 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:40 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x4, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:41 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:41 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 308.685716] protocol 88fb is buggy, dev hsr_slave_0 [ 308.690815] protocol 88fb is buggy, dev hsr_slave_1 03:33:41 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:41 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) r0 = gettid() sched_setparam(r0, &(0x7f0000000000)=0x100) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:41 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:41 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000480)={@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x126, 0x4, 0x0, 0x1, {0xa, 0x4e22, 0x100000001, @ipv4={[], [], @multicast1}, 0x3a3}}}, {&(0x7f0000000140)=""/17, 0x11}, &(0x7f0000000380), 0x2}, 0xa0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') r2 = semget(0x1, 0x4, 0x220) semctl$IPC_RMID(r2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@sha1={0x1, "8f1bc680593a9d12851b87e419ad4e4b48d14c37"}, 0x15, 0x2) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/252, 0xfc) 03:33:41 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:41 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:41 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:41 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:41 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xc, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:41 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') r0 = socket(0x1a, 0x1, 0x6d9) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) 03:33:41 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xe, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:41 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:41 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000200)="4215b6cb73fca0ee6ad6bde61cd248f6ea80cf73b4d47d220469f464d53cce80cd9d861204c92dffbd833642aa5102e10846754e4b7b07c61f14f9bd0b733f540afba9b2662947cf8b9be3d90bad4e3368756ade042d8f2ab5bac1833be4fbf9abf8236ba031bcb4775098f295277780c259cd0242c48440492e7805f11b3c81a16fc94a9e538fa9f4f98b3d0e0d218dc5906c5f6bf36f36a21342d8a504f8d9703a328c146ab506ab9bd109ced020d1f00b3857925ca88e054386effe54bf4f92afd61f66a0799e21bb0b7d7fed11ef23a4535b186d5b47d37753f63dc77820492b212a208f3a5dd0eb5a7366", 0xed, 0x9}], 0x2c00, &(0x7f0000000380)={[{@dmask={'dmask', 0x3d, 0x3d}}, {@disable_sparse_no='disable_sparse=no'}, {@utf8='utf8'}, {@utf8='utf8'}, {@dmask={'dmask', 0x3d, 0xffffffff00000001}}, {@umask={'umask', 0x3d, 0x8}}, {@dmask={'dmask', 0x3d, 0x5}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@measure='measure'}, {@context={'context', 0x3d, 'system_u'}}]}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:41 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:41 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xf, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:42 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:42 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:42 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:42 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:42 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:42 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:42 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:42 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:42 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x800000, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) r1 = getegid() chown(&(0x7f0000000200)='./file0//ile0\x00', r0, r1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f00000000c0)=@md5={0x1, "62b63b51a8ccef16d7b6b9da462829d7"}, 0x11, 0x2) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x8001, 0x80140) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000140)={0x77, 0x4, 0x7, 0x8, 0x6ff}) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:42 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xf0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:42 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:42 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:42 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xfd, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:42 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:42 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x4000) fsetxattr$security_selinux(r1, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:smartcard_device_t:s0\x00', 0x28, 0x3) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x9, &(0x7f0000000200)=[0xee01, 0xffffffffffffffff, 0x0, 0xee01, 0xee01, 0xee00, 0xee00, 0xffffffffffffffff, 0xee00]) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x2000000, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@debug={'debug', 0x3d, 0x80}}, {@afid={'afid', 0x3d, 0x20}}, {@version_u='version=9p2000.u'}, {@cache_mmap='cache=mmap'}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@aname={'aname', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@cache_mmap='cache=mmap'}, {@privport='privport'}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\xeb'}}, {@appraise='appraise'}, {@uid_gt={'uid>', r4}}]}}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)) 03:33:42 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:42 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:42 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:42 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x2, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x79a98f4c) accept4$ax25(r0, 0x0, &(0x7f0000000000), 0x80000) inotify_init() bind$tipc(r0, &(0x7f00000003c0)=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x4, 0x1}}, 0x10) syz_mount_image$xfs(&(0x7f0000000400)='xfs\x00', &(0x7f0000000040)='./file1\x00', 0x1, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000480)="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", 0x1000, 0xece}, {&(0x7f0000000200)="203dca8821263d4e55c4b5af1f059a87d47b762ebb9b7e639fde7550ea97b8ce02b664ab5c4d6646b0fa62a4b7ec2b514fc123b5396ecd3db5b6d359c60f8e6f6204b274b6dfe3f71b1cc60c9f4dea754b1de8a11c75534117fff48c5d283be1158510d51c3c9fe90a4f42573e00a3b01e410ca7d51725deebe989a115b29d2e74f2375988cd932eb594fca89b00f3e34ab44d94d7513c2b2cbb05e8dfb849e8105eea342e8d51cf49f16fce90e0defafe4742e8f90cc07a93d4f2df2f58e49dbea936f4377c382d763066a66907c2cf326eda83a8947436a5d722a2e0825131ca9e774931b2625086d92dedf947c4a0233c8ea69ccd29dce4", 0xf9, 0x4}], 0xffffd, &(0x7f0000000100)=ANY=[@ANYBLOB='pquota,uqnoenforce,lazytime,quota,nouuid,noquota,fscontext=sysadm_u,subj_user=ngroup2\x00,hash,\x00']) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000001580)={@local, @dev}, &(0x7f00000015c0)=0x8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000001540)={0x1, 0x6c}) epoll_pwait(r0, &(0x7f00000014c0)=[{}, {}, {}], 0x3, 0xc6b, &(0x7f0000001500)={0x7}, 0x8) rmdir(&(0x7f0000000340)='./file0//ile0\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001480)=0x0) ptrace$peekuser(0x3, r1, 0xe87) 03:33:42 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:42 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:42 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x600, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:43 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:43 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xa00, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0//ile0\x00', &(0x7f0000000200)='cgroup2\x00\x177\xc4\xecBh\xa7\xe4M\xe0\x03\x95|\xf1~$M\xc7\xb2\x85\x9b8;\xb4!\xeb7/Sk\xcc\x80\x98E\xef\x91\xe3\xc1F\x98\xeb\xb5mO*?bM\x87\xf04\x1a\x88\xab\xdd\xa4\xa7\x17', 0x80, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:43 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:43 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:43 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xc00, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:43 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:43 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:43 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000200), &(0x7f0000000240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() r5 = getgid() fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000580)={{}, {0x1, 0x2}, [{0x2, 0x7, r1}, {0x2, 0x4, r2}], {0x4, 0x6}, [{0x8, 0x2, r3}, {0x8, 0x2, r4}, {0x8, 0x4, r5}], {0x10, 0x4}, {0x20, 0x3}}, 0x4c, 0x1) r6 = socket(0x11, 0x4, 0x3) getpeername$unix(r6, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:43 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:43 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xe00, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:43 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:43 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xf00, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x42000, 0x0) write$P9_RREADDIR(r0, &(0x7f00000000c0)={0x7a, 0x29, 0x1, {0x47fbe0ed, [{{0x2c, 0x2, 0x5}, 0x0, 0x159, 0xd, './file0//ile0'}, {{0x21, 0x3, 0x4}, 0x10001, 0x10001, 0x7, './file0'}, {{0x20, 0x2, 0x5}, 0x5, 0x1000, 0x13, './file0//ile0/file0'}]}}, 0x7a) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:43 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:43 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:43 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x3f00, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:43 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:43 executing program 1: open$dir(&(0x7f0000000000)='./file0//ile0\x00', 0x40000, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x200, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0xfffffffffffffe01) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000001580)='cgroup2\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') recvmsg(r0, &(0x7f0000001540)={&(0x7f0000000200)=@rc, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/46, 0x2e}, {&(0x7f0000000280)=""/113, 0x71}, {&(0x7f0000000380)=""/108, 0x6c}, {&(0x7f0000000480)=""/134, 0x86}], 0x4, &(0x7f0000000540)=""/4096, 0x1000}, 0x10000) 03:33:43 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:43 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x5865, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:43 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:44 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x6000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:44 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:44 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:44 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x6558, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:44 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:44 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:44 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x0, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:44 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x3, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x20000) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0//ile0\x00', &(0x7f0000000100)='bpf\x00', 0x200000, &(0x7f0000000380)={[{@mode={'mode', 0x3d, 0x10000}}, {@mode={'mode', 0x3d, 0x35d1}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0xfffffffffffffff8}}, {@mode={'mode', 0x3d, 0x3}}], [{@uid_gt={'uid>', r1}}]}) syz_mount_image$nfs(&(0x7f0000000140)='nfs\x00', &(0x7f0000000280)='./file0\x00', 0x3d992055, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000440)="c1353915cc4deecebd03297b18a1cde3a18e822e03f90c023e0903bed1246ad3b402ee923bb4df568c394f15be718ac72a322d150fb2eb9a4360988e3ce3e29d30dcefe1b8e236243c9007403a48524ac7b6a83ea51107f67e", 0x59, 0x9980}], 0x200000, &(0x7f00000004c0)='\x00') rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:44 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x8100, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:44 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:44 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:44 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x0, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:44 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:44 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000280)=r1, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:44 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xf000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:44 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:45 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xfd00, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:45 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:45 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000280)=r1, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:45 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) r1 = dup(r0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x440) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000040)=0xfffffffffffff32c) ioctl$VIDIOC_DBG_G_REGISTER(r2, 0xc0385650, &(0x7f00000000c0)={{0x0, @addr=0xb4d}, 0x8, 0x2, 0xe0e}) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:45 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x0, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:45 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x34000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:45 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) [ 312.845751] net_ratelimit: 10 callbacks suppressed [ 312.845760] protocol 88fb is buggy, dev hsr_slave_0 [ 312.856326] protocol 88fb is buggy, dev hsr_slave_1 03:33:45 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000280)=r1, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:45 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:45 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x400300, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:45 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:45 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7fff, 0x400) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r0, &(0x7f0000000200)="f41548362e71326aba8884010c47b5bdf4b4093ea82cab5c179a91dd915fda5b8b8c840d55a456c3eac1683f2e61f434de202cd9a7d912407336f780ee5f99320790eb76a34f70769eb74cb193c0bbca52f67ed243ef39cae16ec2b301a463c0354ff2d8144ad38dc779e99729ebce1aab5ce6d97a27178af4dc8ab2ab46cbf6661c37413bda5d7eeb561891e4549c163d94a8b7a4f714e6425d57344da48c51c3d97cc69d1f5637118dd6cd4b143f57f49eb46423dc871f41e996e28dd174f97d753ee6"}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000140)={0x5, 0x3, 0x1a9, 0x3, '\x00', 0x81}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f00000000c0)={0xc3}) socket$inet_icmp_raw(0x2, 0x3, 0x1) 03:33:45 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:45 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:45 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:45 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x1000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:45 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:45 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x102) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:45 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:45 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x2000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:45 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:45 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:45 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x3000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:46 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:46 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x4000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:46 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:46 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) r0 = socket(0x1, 0x5, 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0x7fff, @mcast2, 0xffffffff}}, 0x4, 0x1f, 0x10, 0x8, 0xfffffffffffffffb}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x400, 0x3, 0x1, 0x4, r1}, &(0x7f0000000200)=0x10) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:46 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x6000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:46 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:46 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) [ 313.885746] protocol 88fb is buggy, dev hsr_slave_0 [ 313.890922] protocol 88fb is buggy, dev hsr_slave_1 03:33:46 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x8000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:46 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:46 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:46 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:46 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x208280, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f00000002c0)='./file0\x00') sendmsg$nl_crypto(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x24000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=@get={0x128, 0x13, 0x305, 0x70bd2c, 0x25dfdbfe, {{'drbg_pr_ctr_aes128\x00'}, [], [], 0x2400, 0x2400}, [{0x8, 0x1, 0xffff}, {0x8, 0x1, 0x3}, {0x8, 0x1, 0x4}, {0x8, 0x1, 0x101}, {0x8, 0x1, 0x2b2f}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x9fee}, {0x8}, {0x8, 0x1, 0x1}]}, 0x128}, 0x1, 0x0, 0x0, 0x811}, 0x40) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0//ile0\x00', &(0x7f0000000040)='overlay\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r0, 0x10, &(0x7f0000000240)={&(0x7f0000000200)=""/9, 0x9, 0xffffffffffffffff}}, 0x10) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$binfmt_elf64(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x80000000000, 0x8000, 0x3, 0x0, 0x9, 0x3, 0x3f, 0xfffffffffffffff7, 0x1a1, 0x40, 0x27e, 0x4, 0x8000, 0x38, 0x1, 0x2, 0x5, 0x9}, [{0x7, 0x6a, 0x24187404, 0x6, 0x4, 0x1, 0x6, 0x1}, {0x3, 0x5, 0x800, 0x1f, 0x81, 0x3, 0x6, 0x6}], "63789e260b87eb42b34aff341a70bc0771929cbfb21a8e3131edf90399c51e04f50d8092e10c596d1c1f3094c3ac696d05751bb4229cf9b99f67d172d2c447ea4ca89da3647bc8dabe1801557ff41d8845cf5def8196302151ddf067ce4027571e45be97b7d069be4efa1290867601b062", [[], [], [], [], []]}, 0x621) 03:33:46 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:46 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xa000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:46 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:46 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xc000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 314.205708] protocol 88fb is buggy, dev hsr_slave_0 [ 314.210944] protocol 88fb is buggy, dev hsr_slave_1 03:33:46 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) [ 314.285698] protocol 88fb is buggy, dev hsr_slave_0 [ 314.290824] protocol 88fb is buggy, dev hsr_slave_1 03:33:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0//ile0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0//ile0\x00', 0x40) r1 = add_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="7797e924383a9cfa69a00490daf98dea968d94ff4b40481bf2d08d0e0b77c284fa990afdf2ee09", 0x27, 0xfffffffffffffff8) keyctl$negate(0xd, r1, 0x5, r2) write$eventfd(r0, &(0x7f00000002c0)=0x6f23, 0x8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x8) rmdir(&(0x7f0000000340)='./file0//ile0\x00') lsetxattr$security_evm(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='security.evm\x00', &(0x7f00000003c0)=@md5={0x1, "5e9bd66f6a75031d5e57e1cdcfa0c8a4"}, 0x11, 0x2) 03:33:46 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:46 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:46 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:46 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xe000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 314.445697] protocol 88fb is buggy, dev hsr_slave_0 [ 314.450970] protocol 88fb is buggy, dev hsr_slave_1 03:33:46 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:46 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x0, 0x2) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x24, r1, 0x810, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x5}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000001}, 0x2000c000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="d610baaeeab539dd85f16aa79bdb76505c5d890f40fb4862d6429cf1c893d74335913bb97e906b58974929a220c78f649b565c7f7af8e6bbc373e6c56f81584e1c0f460b764c4041ce85612c63637da3c3dd652fdc0e3f99be0d4467f6dd71f8cff90f652788c7cb7be885ba3211c25d18680a", 0x73, 0x7}], 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x29c0, 0x0) 03:33:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:47 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:47 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xf000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:47 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:47 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:47 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x10000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 314.745542] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 03:33:47 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) [ 314.909248] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 03:33:47 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x80, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) write$P9_RMKNOD(r0, &(0x7f0000000040)={0x14, 0x13, 0x2, {0x2, 0x4, 0x3}}, 0x14) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:47 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x3f000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:47 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:47 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:47 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x0, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:47 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x60000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:47 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:47 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:47 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:47 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x65580000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:47 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') mount$overlay(0x0, &(0x7f0000000000)='./file0//ile0\x00', &(0x7f0000000040)='overlay\x00', 0x6, &(0x7f00000000c0)={[{@metacopy_on='metacopy=on'}, {@xino_off='xino=off'}], [{@fsuuid={'fsuuid', 0x3d, {[0x63, 0x62, 0x61, 0x3d, 0x36, 0x7f, 0x61, 0x38], 0x2d, [0x0, 0x34, 0x66, 0x62], 0x2d, [0x34, 0x75, 0x35, 0x62], 0x2d, [0x61, 0x37, 0x0, 0x7d], 0x2d, [0x77, 0x0, 0x77, 0x0, 0x73, 0x66, 0x66, 0x36]}}}]}) 03:33:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:47 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:48 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x0, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:48 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:48 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:48 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:48 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x88a8ffff, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000200)=0x8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000040)) r1 = gettid() sched_getparam(r1, &(0x7f0000000140)) rmdir(&(0x7f00000000c0)='./file0//ile0\x00') ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000000)) 03:33:48 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:48 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x9effffff, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:48 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:48 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x0, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:48 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:48 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:48 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:48 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000480)={0x0, 0x0, 0x7, 0x0, [], [{0x5, 0x7, 0x400, 0x0, 0x9, 0x4}, {0x4, 0x4, 0xfffffffffffffe00, 0x80, 0x7fffffff, 0x5}], [[], [], [], [], [], [], []]}) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:lib_t:s0\x00', 0x1b, 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:48 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:48 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:48 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xfd000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:48 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:48 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:48 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xffffa888, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:48 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:48 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x80, 0x4000) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f00000000c0)={0x9, 0x100000001, 0x80}) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000040)) get_thread_area(&(0x7f0000000100)={0x5, 0x1000, 0xffffffffffffffff, 0x0, 0x2008, 0xffffffff80000000, 0x1f, 0x2, 0x5, 0x100000001}) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x9) 03:33:48 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xfffff000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:49 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:49 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:49 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:49 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xffffff7f, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x100, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000000c0)={0x0, {0x2, 0x4e20, @rand_addr=0x3}, {0x2, 0x4e22, @remote}, {0x2, 0x4e20, @multicast1}, 0x80, 0x0, 0x0, 0x0, 0x40, &(0x7f0000000040)='ip6_vti0\x00', 0x8, 0xd998, 0x6}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f00000003c0)={0x5, 0x6, @name="1d178521a8577bb6077719da110806007acbca3cca623695316dcbccb6f4d035"}) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@loopback, @initdev}, &(0x7f0000000380)=0x8) rmdir(&(0x7f0000000340)='./file0\x00') getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000200)=""/190, &(0x7f0000000140)=0xbe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r1, 0x0) 03:33:49 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xffffff9e, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:49 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:49 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:49 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x101000, 0x0) ioctl$VT_RELDISP(r0, 0x5605) write$P9_RWSTAT(r0, &(0x7f00000000c0)={0x7, 0x7f, 0x2}, 0x7) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000100)=0x216) 03:33:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:49 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xfffffff0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:49 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000400)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0//ile0\x00', 0x10000, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="3d44466cb43220e132b043f2d128561ebb22a1c2ee16be3c5cb719c820557cc3a5622aa79062eb3a98dadedb924d3e7c6a90d71b504d81ac7fe6459c65f82da82f754ffd14b271adc20816fd47e42fd14ee365ad065d898cd596a15036bf8eeab4202b7112ff897c2512152066a6b145cccd5e9a47b4e9058d214bc94dd47312", 0x80, 0x6}, {&(0x7f0000000140)="f6e96b8469afd0dc4c50bf4f", 0xc}, {&(0x7f0000000200)="5f67f2f774776454c56424d2ca891821c2420e106cdee078b43c3bf020949ba837190755f9cb0ec048494bf399b3c3e6266697e71b7c28432b8e2a48c4eeb1f58f81cb9ccbb4a2f96931da0f071d2766a6a61ed58a0a4a8bc71b436bbbfdcbc34c99e11d50ee70f471da3bb074af5f5f1dfab10ade80a3b71306f50ba60b5531a48295e740edcea3b255448977621ba1e9605ea21ff00f39abdb634d408a0294380e0e8cc27ee7ff0375078b9e92148a109283f23d", 0xb5, 0x3ff}], 0x40008, &(0x7f0000000540)=ANY=[@ANYBLOB="646973636172643d30783030303030303030303030303004000000000000b3d7e27043d0b29bfeebea2d83005f747970653d2e7e6435737579726901d0c5954b8bab7fe025067f8f9c1b36cc67002c000000000000000000006908a6c284dc527dd1401954629e61fa655ae8b6d90c366a71819ad91aa89dd35841429f1c4eed900000000000000000"]) rmdir(&(0x7f0000000340)='./file0//ile0\x00') getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x1f, &(0x7f00000004c0), &(0x7f0000000500)=0x4) 03:33:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:49 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x40030000000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:49 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:49 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:49 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file1\x00') lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x0) 03:33:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:49 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xf0ffffffffffff, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:49 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:50 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:50 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:50 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x100000000000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:50 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/165) rmdir(&(0x7f0000000340)='./file0//ile0\x00') r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001640)='/proc/capi/capi20ncci\x00', 0x204100, 0x0) setsockopt$llc_int(r1, 0x10c, 0x7, &(0x7f0000001680)=0x4, 0x4) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000000)={0x3f, 0x6, 0x400}) 03:33:50 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x200000000000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:50 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:50 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:50 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x300000000000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:50 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:50 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x400000000000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:50 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:50 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:50 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x600000000000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x1000, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:50 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x800000000000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:50 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:50 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:50 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:50 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xa00000000000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:50 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f00000000c0)=r2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e21, 0x33, @mcast1, 0x20}}, 0x56, 0x6, 0x7fffffff, 0x8, 0x40}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e20, 0xfffffffffffffff7, @empty, 0x5}}, 0x6, 0x200000000, 0x401, 0x400, 0xcb}, &(0x7f0000000140)=0x98) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:50 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:51 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xc00000000000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:51 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) [ 318.606102] net_ratelimit: 8 callbacks suppressed [ 318.606109] protocol 88fb is buggy, dev hsr_slave_0 [ 318.616111] protocol 88fb is buggy, dev hsr_slave_1 03:33:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x280002, 0x0) getsockopt(r0, 0xff, 0x0, &(0x7f0000000200)=""/194, &(0x7f0000000040)=0xc2) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:51 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:51 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:51 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xe00000000000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:51 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:51 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xf00000000000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) socket$l2tp(0x18, 0x1, 0x1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x8000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x6742) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400040}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040000) 03:33:51 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:51 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:51 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:51 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x1000000000000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:51 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0//ile0\x00', &(0x7f00000003c0)='pipefs\x00', 0x2000000, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:51 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:51 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x3f00000000000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9fc, 0x40) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet_mreqn(r0, 0x0, 0xe9c23de16f2e0ff6, &(0x7f00000000c0)={@local, @rand_addr=0x5, r1}, 0xc) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:51 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x6000000000000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:51 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:51 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:51 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:52 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x6558000000000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000000c0)=""/145, &(0x7f0000000040)=0x91) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:52 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:52 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x8100000000000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:52 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:52 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:52 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x88a8ffff00000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x2a7, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountstats\x00') write$P9_RREADLINK(r0, &(0x7f00000000c0)={0x16, 0x17, 0x1, {0xd, './file0//ile0'}}, 0xfffffffffffffecd) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:52 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x9effffff00000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 319.975691] protocol 88fb is buggy, dev hsr_slave_0 [ 319.980795] protocol 88fb is buggy, dev hsr_slave_1 03:33:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:52 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:52 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:52 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xf0ffffff00000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:52 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:52 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x40) fchmodat(r0, &(0x7f0000000040)='./file0//ile0\x00', 0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:52 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xfd00000000000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:52 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) [ 320.445753] protocol 88fb is buggy, dev hsr_slave_0 [ 320.450912] protocol 88fb is buggy, dev hsr_slave_1 03:33:52 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xffffff7f00000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:52 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x200080) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000200)=0x5) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10001, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0xcf}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f00000000c0)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000100)={r2, r3, 0x8}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x30801, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') [ 320.525729] protocol 88fb is buggy, dev hsr_slave_0 [ 320.530809] protocol 88fb is buggy, dev hsr_slave_1 03:33:53 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xffffffff00000000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(0x0, &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:53 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:53 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:53 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000016c0)={0x0}, &(0x7f0000001700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001740)={{{@in6=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@loopback}}, &(0x7f0000001840)=0xe8) r3 = getegid() r4 = getpgid(0xffffffffffffffff) getresuid(&(0x7f0000001d00)=0x0, &(0x7f0000001d40), &(0x7f0000001d80)) getgroups(0x2, &(0x7f0000001dc0)=[0xffffffffffffffff, 0x0]) r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001e00), 0x4) r8 = socket$can_bcm(0x1d, 0x2, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e40)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@empty, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001fc0)={0x0, 0x0, 0x0}, &(0x7f0000002000)=0xc) r12 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000002040)='/dev/vhost-vsock\x00', 0x2, 0x0) r13 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002080)='net/ip_tables_names\x00') fcntl$F_GET_FILE_RW_HINT(r7, 0x40d, &(0x7f0000002340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000020c0)={0x0}, &(0x7f0000002100)=0xc) getresuid(&(0x7f0000002140), &(0x7f0000002180)=0x0, &(0x7f00000021c0)) r16 = getgid() sendmmsg$unix(r0, &(0x7f00000022c0)=[{&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001600)=[{&(0x7f0000000200)="381124d8319ed558c2825419c279c0cac412ef6bec1f936b00560c7b57bd8d92be59466280f1ad54a80b5a4efdd3c524e7657bcd93f6c23ca8fb8aae87675a37af1250bf085f494b38e2fee93e17551c2a52a8fefa1f733af09adfa8424e938ae83dae90a4794869cfb8f703a9b5d0a4fb121356a9f931fbbea0ffba268651ec2fe74f8fd43cf738ffc526a53a05a3ccb749df53103c155ac3b7f58f9a3d49e1929cbbf2b7a908b923c294e936bc1fa1adb42a3d7cb48e889eed217687add582900593537263e84918ef57adf99fce31e39cdbd824b59026242142be7150f972c4543b8aa7d281aecf897b001486ea7ef87afbe2e37833af", 0xf8}, {&(0x7f0000000040)="446ca5f62aab7b197446986469c9001084d2d1324b1049f1016b27a631e4af9c1815678484f243066e884c9d615ec22d6d91b9", 0x33}, {&(0x7f0000000140)="09803e1092192f0e9cb9918df2dfa394ff0d8796e887b44b017bbbcefe", 0x1d}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000000380)="ffb2", 0x2}, {&(0x7f0000001480)="5ec756a23f97ea8ba053614ecd0d5232b94d407a943e50588f3d8c185bd3460835bbf8bf8dbba256bc7d2a7f8fa799fa6e8fe65619f2c99177405b0aba183eaaa5d3219cc152dc1969e19ac04c67513b8b192e0fe0e5ce5a6f363452036857c15b61fa2d8563699f08ab66e91bf86706fd40e3bd060bf236745a1d8186cf49d99a9b02d8097200f315a8618aaf132ce59cd2ea481fa3f4ecf4db3c4f2a669ed2ba9fc3c86574399d3f374ccbf7988c8f00b00a1e5ed24e0a4667d8bb1bdfa9e110196e386ac01145258b7aad95af701211373473ebd723e4c2c0bf091f10fde84cd1", 0xe2}, {&(0x7f00000003c0)="f2ff43e02ab3d01e5c52f09ffd962d11caa8b59878e6839c690e9c07ad", 0x1d}, {&(0x7f0000000400)="b32cbdb1250f0685a44c99e86e5cd00671b7d0f348a1059f3d9428193c4eec76ba4287669268994624d954ef2e352668e86408", 0x33}, {&(0x7f0000001580)="86dbbda428f345b23552fbe62552de9701a7939c1070677dac993939b45b51d26a75c945e52d28176b3ca28db60dbcf6a7dc9f78208e36613ce798e9bba11c646bbb3ed3c84fb70b3a5516c8e760b4fb09a274b50bd69663dc", 0x59}], 0x9, &(0x7f0000001880)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}], 0x20}, {&(0x7f00000018c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001cc0)=[{&(0x7f0000001940)="2fcb7bad8152aedaa5621b2c9e399372461cb49f6954ee33b6741008bc19d3a09acf22c7bb13719084504e12f5a3875fbcc11e1b824b6ad658d07deb00779a5ad27489939cf60e7969a33f793d45c1e42cc386441e13ca3d892549e6a3cfb7c0672abd8198a24e41c80a96347eeabcb05b09c3286e5c95a014ca39418f24bca0f2bbf108a04e9344d3f43784d0ad55de4aec3775fbd7c709bd4484c5d908bd9fa078c8fbfe336da3acaa8dfa1df399d5527b23a7aedc86f6eef78aeea539cb9bf31255384158350d242d1fa73f28bbbfb521e01f5adff733242fd32d9ae2ed95e768cb1c90143bfe740ec53c", 0xec}, {&(0x7f0000001a40)="ff0e541661f18272799add2a9e89ab43a725e4952528e511bc3fddacdfc64decdf72fe1555471c5587e318620f41479a1d215a489a3c3b3f37525a68fdfc975523ca016ef4815bd73af5f989eb512def5256554dae1b335588342b1e8731684f5576b21d6aa3b56446e429b5849ec9bf6f79db34995556483e2860482da9648ec0df7827a6ce69246e5fbb09da14a99d8dcfb75bb3c86cf3c2b1de72efda070a403d5cca8e104eb03a788621f536f6bc5b63ee38d15d6933970f2ffb54b821a9c23fdd0cf0153b825a1966ed1461af5c321c77557897dc11", 0xd8}, {&(0x7f0000001b40)="5c93d511925276b1b77e2c860a6b60201445fa1ec0bd6648bef090c15da4cd5d688789ecb4580ab1adb14ab82ba63b169c7b49711f80dcadcc37ef28e3ae6132c6e53fa60faf6363b75d75e0f14b1256a5943f7a49f581e7b3212bde7f317df749636216e29b97035f43a62bce682d339f5ba1a9a341e26a978f6cce7051faf47a8ac80f37db807680f2dc1a6c2742dd7c12568f547e21f25f9fbd518f0aa9ff5554be313b068b2e7b9ded4489feb2396905477d0529900240e3ba40f9a8beadcdff7d9b085a4eeed2ddff33424b932fca73667462ddb4", 0xd7}, {&(0x7f0000001c40)="851fc819deb7005e3af7dae91eea3357e528a7bdbc59159e2370e111ecfd5fa492647d4b64b09b6cff1e60b73ce0a0c4d42c7d26779919ebb791b2850e68ba57ccbfcbde6097a5e5f24ffc0aa99ebdbac857cb1ae85123418f468c54d0d2acace4b75cd751c8", 0x66}], 0x4, &(0x7f0000002200)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x18, 0x1, 0x1, [r7, r8]}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @rights={0x18, 0x1, 0x1, [r12, r13]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}], 0x90, 0x40}], 0x2, 0x4000004) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) pwritev(r12, &(0x7f0000002440)=[{&(0x7f0000002380)="9cee1055bb7776b2b6fbdcb6cad890d230931ce965ac43933c9e28f96654c5538389ad2d66cf1e0587bf03b231c18914a42d0eb7d2dc066e8baf159dab2f6f97936830c7ef2f05ea88f3f3c2d1efe1d8f7cba67cf94365818cdbdbafab5ff9e26f1b24fcefdb49e4a6db623909cb32ddc3c2e76711763e3edd7269cc1564e95079ec5725237ea9027ef67db15db8b47837c87fc1164e368d77f8027d", 0x9c}], 0x1, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:53 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xfffffffffffff000, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:53 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, 0x0, 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(0x0, &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:53 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:53 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:53 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, 0x0, 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:53 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:53 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(0x0, &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000680)='./file0//ile0\x00', 0x1000) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="6eb9c6a4fa86606230bab1f58da93df60bd3aa", 0x13, 0x3}, {&(0x7f0000000100)="89c939ea02aa82fcbea838f0af31587285", 0x11, 0x2}, {&(0x7f0000000200)="ae7df5e660bf1770e2a795a90ff876d70f40df8239c28e6390afe374e31cd2622f65486fd5308e79097d7dfe55f3c50d8b3135ebcaef72ede5abf30fab99e8facf63fff28240f071cd372c1809870ace3c08dbc2c3c9f85e6e085f908ad46e094b1df7fa1d4175939b7313835ecf5eef67", 0x71}, {&(0x7f0000000280)="ea6e96d8fb65e0c7d3b598ca4a2c3a5443cbb9ac345f82c94c444af6c99182562664b27627d9aadc90ca84524489154d18d54b9b17c2ee36872f366b216fd003874b9f76e5db726948fe88613f04901bef9b79b030240a67f55b507988275ef921045ad92d6acdde9c0e16f586b5de4330cfc734945e622adeec487d", 0x7c}], 0x1000, &(0x7f0000000480)={[{@nonumtail='nnonumtail=1'}, {@rodir='rodir'}, {@utf8no='utf8=0'}, {@uni_xlateno='uni_xlate=0'}, {@uni_xlateno='uni_xlate=0'}, {@nonumtail='nnonumtail=1'}, {@fat=@nocase='nocase'}, {@nonumtail='nnonumtail=1'}, {@nonumtail='nnonumtail=1'}], [{@measure='measure'}]}) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x100, 0x9}, &(0x7f0000000400)=0x90) getresuid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) mount$9p_rdma(&(0x7f0000000300)='127.0.0.1\x00', &(0x7f0000000640)='./file0//ile0\x00', &(0x7f00000006c0)='9p\x00', 0x800000, &(0x7f00000007c0)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x3ff}}, {@rq={'rq', 0x3d, 0xccb}}, {@common=@cache_fscache='cache=fscache'}], [{@smackfsroot={'smackfsroot', 0x3d, 'user{eth1\\+[vboxnet1nodev'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@seclabel='seclabel'}, {@fowner_gt={'fowner>', r2}}, {@audit='audit'}]}}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000005c0)={r1, 0x1000, 0x9, 0x1, 0x8001, 0x80}, &(0x7f0000000600)=0x14) r3 = add_key$user(&(0x7f00000008c0)='user\x00', &(0x7f0000000900)={'syz', 0x0}, &(0x7f0000000940)="1254e0db3ca4fdf60b25f1ead2c5164093f892bdaf99ee26a64e0fb85c76e26e7f3e1fb16b10c1ac5ee956f2da7042200b37149f4c3e52", 0x37, 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f0000000980)=""/73, 0x49) [ 321.165720] protocol 88fb is buggy, dev hsr_slave_0 [ 321.170848] protocol 88fb is buggy, dev hsr_slave_1 03:33:53 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:53 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:53 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, 0x0, 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', 0x0, &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:53 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:53 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', 0x0, &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:53 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:53 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:53 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x0, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0//ile0\x00', 0x200000012b) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:54 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:54 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', 0x0, &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:54 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x0, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:54 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:54 executing program 1: r0 = semget$private(0x0, 0x3, 0x504) clock_gettime(0x0, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) semtimedop(r0, &(0x7f00000003c0)=[{0x0, 0x4, 0xffd}], 0x1, &(0x7f0000000240)={r1, r2+30000000}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8000, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000100)={@empty, @dev={0xac, 0x14, 0x14, 0x21}, r4}, 0xc) rmdir(&(0x7f0000000340)='./file0//ile0\x00') bind$ax25(r3, &(0x7f0000000480)={{0x3, @bcast, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) rseq(&(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x4, 0x6, 0x7, 0x3}, 0x7}, 0x20, 0x0, 0x0) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0xa) 03:33:54 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:54 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', 0x0, 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:54 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x0, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:54 executing program 1: r0 = inotify_init() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x80000, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x7f) r2 = dup(0xffffffffffffffff) r3 = request_key(&(0x7f0000000240)='rxrpc\x00', &(0x7f0000000280)={'syz'}, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000140), &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, r3, 0x2) getdents64(r2, &(0x7f00000002c0)=""/79, 0x4f) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000680)=0x3, 0x4) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000380)={0x1, 0x3, [{r2, 0x0, 0xfffffffff0000000, 0x1000}, {r2, 0x0, 0x10000, 0xfffffffffffff000}, {r2, 0x0, 0xfffffffff0002000, 0x100000000}]}) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r7 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x6f3, 0x925d2e8, 0x0, 0x2, 0x0, 0x2, 0x2000, 0xa, 0x3, 0x8001, 0x1, 0x9, 0x4, 0x5, 0x8, 0x7, 0xfffffffffffffffd, 0x6, 0x0, 0x7, 0x7, 0xd, 0x1, 0x1f, 0x8001, 0x2, 0x10001, 0x7b1, 0xffff, 0x0, 0x38, 0xffffffffffffff00, 0x1, 0x8, 0x7, 0xff, 0x0, 0xfffffffffffffff9, 0x0, @perf_config_ext={0xb0, 0x7fff}, 0x10, 0x40, 0x9, 0x7, 0x7, 0xff, 0x3}, r7, 0x1, r4, 0xa) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, 0x2010, r6, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x8) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000004c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYRES16=r8, @ANYBLOB="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"], 0x210}, 0x1, 0x0, 0x0, 0x4008041}, 0x4000004) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) sendfile(r5, r5, &(0x7f0000000000), 0x2000005) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) flistxattr(r5, &(0x7f0000000540)=""/4, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:54 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', 0x0, 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:54 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:54 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:54 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:33:54 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', 0x0, 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:54 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:54 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:54 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:54 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 03:33:55 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:55 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:55 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:55 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:55 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x200, 0x80c0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000040)=0x8) mkdir(&(0x7f00000000c0)='./file0//ile0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:55 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:55 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:55 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:33:55 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:55 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:55 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0//ile0\x00') [ 323.233243] 9pnet_virtio: no channels available for device 127.0.0.1 03:33:55 executing program 4: r0 = inotify_init() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x80000, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x7f) r2 = dup(0xffffffffffffffff) r3 = request_key(&(0x7f0000000240)='rxrpc\x00', &(0x7f0000000280)={'syz'}, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000140), &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, r3, 0x2) getdents64(r2, &(0x7f00000002c0)=""/79, 0x4f) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000680)=0x3, 0x4) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000380)={0x1, 0x3, [{r2, 0x0, 0xfffffffff0000000, 0x1000}, {r2, 0x0, 0x10000, 0xfffffffffffff000}, {r2, 0x0, 0xfffffffff0002000, 0x100000000}]}) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r7 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x6f3, 0x925d2e8, 0x0, 0x2, 0x0, 0x2, 0x2000, 0xa, 0x3, 0x8001, 0x1, 0x9, 0x4, 0x5, 0x8, 0x7, 0xfffffffffffffffd, 0x6, 0x0, 0x7, 0x7, 0xd, 0x1, 0x1f, 0x8001, 0x2, 0x10001, 0x7b1, 0xffff, 0x0, 0x38, 0xffffffffffffff00, 0x1, 0x8, 0x7, 0xff, 0x0, 0xfffffffffffffff9, 0x0, @perf_config_ext={0xb0, 0x7fff}, 0x10, 0x40, 0x9, 0x7, 0x7, 0xff, 0x3}, r7, 0x1, r4, 0xa) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, 0x2010, r6, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x8) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000004c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYRES16=r8, @ANYBLOB="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"], 0x210}, 0x1, 0x0, 0x0, 0x4008041}, 0x4000004) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) sendfile(r5, r5, &(0x7f0000000000), 0x2000005) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) flistxattr(r5, &(0x7f0000000540)=""/4, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:55 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:55 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:33:55 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fdatasync(r0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) utime(&(0x7f0000000040)='./file0//ile0\x00', &(0x7f0000000100)={0x100000000, 0x1f}) r1 = semget$private(0x0, 0x0, 0x100) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000480)=""/4096) semctl$GETZCNT(r1, 0x4, 0xf, &(0x7f0000000280)=""/160) rmdir(&(0x7f00000000c0)='./file0//ile0\x00') r2 = dup(r0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000340)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000240)={r3, 0x80000, r2}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000140)=0x3, 0x4) [ 323.512969] 9pnet_virtio: no channels available for device 127.0.0.1 03:33:55 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:55 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:56 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:33:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20200, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000480)={{0x6, 0x5, 0x40, 0x8, '\x00', 0x8}, 0x5, 0x46, 0x8, r1, 0x6, 0xffffffffffff8001, 'syz1\x00', &(0x7f0000000100)=['cgroup2\x00', 'md5sum\x00', '/&\x00', 'em0\x00', 'cgroup2\x00', 'cgroup2\x00'], 0x26, [], [0x3, 0x9d5f, 0x1, 0xfffffffffffffff7]}) 03:33:56 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 323.785257] 9pnet_virtio: no channels available for device 127.0.0.1 03:33:56 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) 03:33:56 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:56 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:56 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x208280, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f00000002c0)='./file0\x00') sendmsg$nl_crypto(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x24000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=@get={0x128, 0x13, 0x305, 0x70bd2c, 0x25dfdbfe, {{'drbg_pr_ctr_aes128\x00'}, [], [], 0x2400, 0x2400}, [{0x8, 0x1, 0xffff}, {0x8, 0x1, 0x3}, {0x8, 0x1, 0x4}, {0x8, 0x1, 0x101}, {0x8, 0x1, 0x2b2f}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x9fee}, {0x8}, {0x8, 0x1, 0x1}]}, 0x128}, 0x1, 0x0, 0x0, 0x811}, 0x40) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0//ile0\x00', &(0x7f0000000040)='overlay\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r0, 0x10, &(0x7f0000000240)={&(0x7f0000000200)=""/9, 0x9, 0xffffffffffffffff}}, 0x10) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$binfmt_elf64(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x80000000000, 0x8000, 0x3, 0x0, 0x9, 0x3, 0x3f, 0xfffffffffffffff7, 0x1a1, 0x40, 0x27e, 0x4, 0x8000, 0x38, 0x1, 0x2, 0x5, 0x9}, [{0x7, 0x6a, 0x24187404, 0x6, 0x4, 0x1, 0x6, 0x1}, {0x3, 0x5, 0x800, 0x1f, 0x81, 0x3, 0x6, 0x6}], "63789e260b87eb42b34aff341a70bc0771929cbfb21a8e3131edf90399c51e04f50d8092e10c596d1c1f3094c3ac696d05751bb4229cf9b99f67d172d2c447ea4ca89da3647bc8dabe1801557ff41d8845cf5def8196302151ddf067ce4027571e45be97b7d069be4efa1290867601b062", [[], [], [], [], []]}, 0x621) 03:33:56 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:56 executing program 1: listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/3, 0x3) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) syz_open_dev$swradio(&(0x7f0000001cc0)='/dev/swradio#\x00', 0x1, 0x2) socketpair(0x3, 0x0, 0xc2d3, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000001c00)=[{&(0x7f0000000100)=@file={0x1, './file0//ile0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000200)="b7e13f83614b7fe94253311f4b63b6e6bdeac1bd5981b217ee5e2f5d78c52b876a", 0x21}, {&(0x7f0000000240)="031e34a6ae9d550d937d108897292431a01e0a1f6bbdbd33bcb0eb046a37f1edfe973ad6de8cbc3143da6c36c62a108c48ccb651b0d2fb066989b68911a390c7d24aebe76b29a6afaee244bae60d6491475a7d82aaf83b9323692142371557d5efe6658747ba8cb45a4c5aaad03efe93b4a8af641f44f4bea8816718c2b0e9dbb6a52bd68448155d6633613532c0e5b4a5cbf33f248922", 0x97}], 0x2, 0x0, 0x0, 0x4004}, {&(0x7f00000003c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001740)=[{&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="8111dcf715c84c063dbb402d78c27c4e1d571d3b69d9e625dc63c6175a2c46338a0979aca30e9f2323d2ee67e3dbe179ba5151d14853ed20e686972ee06c9b4c7b05454f788fc260e755d2c2d536fe2c9e62c00c13186fd1de9ba96220f5570f9c09f2229f4dbfa43ae071f290cc2ca3c21d0c191a2a3053d6bab4990a2e51b35d4b0b4613a7e85f3ae0d39174980e9f8fa02e658eb21f21e08341b6d8b2b57d24b9fc38ff2353884e2193e80e282d02dc2fc89dc12247f7f85fd1463c44bae852da201e5944f71262", 0xc9}, {&(0x7f0000001580)="3961945fcc47f844b4db8888ba883818ec7980047c91d4a2be59b816103136c12d2b7bff6d83dabbf25175ad94140931c5ec01bb11aa70ed3bb3c04ba5b5e7a0481a8b945faff5b97778fdb70efde8cd61414360dd151d99f56e51f7e774124ffbdb725ff857f1509801ef65aecf6bcc2783bc1cd2ce8899", 0x78}, {&(0x7f0000001600)="fe539fb329741ca667e171e4f2ce956dfa9a69e80c61aa8abd561e5bc8d8aa23ace1581ba4d181474eba22635725b09d98ddc7896ec3f25d1f7f0efd38894e1c95fd3e80e333326c6a066b94eae01daefc76e7344fd7dc03b79a51c30534f8391e0d1f8e11cc8dfefc8502e73c30f4be2d87e2cf49c6cce423b6890ca4e11574ffb13c0e5a108273de9ef9b070d162e91cee10319a71fe1faa", 0x99}, {&(0x7f00000016c0)="bf4bd9c55e348e8c485a309ec2d21419431b60e179810f4626d6067197dbfd3ffcdb9d572a15ba6e46fba6e6faee945ec51150f8a1c73bd835a1f046d1bfb2b115d765a4344e13baa800f0", 0x4b}], 0x5, 0x0, 0x0, 0x4000000}, {&(0x7f00000017c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001bc0)=[{&(0x7f0000001840)="cba6cd5355c479be9dd3d78e56f479c58bba0ca75cf4c41b7a6ce52779be69f9ba1a9caab5da9760cfddf8a7147359c5a1bfcfff0fa76f76d017b4d15734cf0766c4d4c06bcc2e6d4aa56b1870d1e0468c766f021b956c604fcf7fe8704cbb0d79a27d955248a90986d508a2195a5dd71ea3ca17bab682af07239d9b067825868aef99f80df9d55f15f26fa641c2a226ce11684ab965d519886236d129aa3fc317bac2", 0xa3}, {&(0x7f0000001900)="a1a6327f9eae4a18e4da726afaa5e2754564fb10aec37cce4d18666fe82f9b15f7544f03094ec7a49b011e22955089e701aa8bb58f38d40fb3b70a08635bdb53b41196364f1318b8f666f060ed5fbd862ca62280f562421475b6acfd3f612590b6e5ace999d984f426f6f5415362685ff63eab9f8fe939c6e1b4794b05b25c43950d35050044d76f77e072b8d2aaa79ea8f8a2133ed5bd310c4f34f2b7b77421f76b514377ad2948856708552a838fd69856f007c23ee7f96a7d922674c2a2cebe", 0xc1}, {&(0x7f0000001a00)="376159543e8aa2e69d18ff3a540ab410925ec0752336814250ab70d65b53304e7158be69d04a37278776c0976798517311efb53ffb2b75eba665883948084cf4cc3d3cbe941fe0c6b6380a31107882363639000e1e18d2ab8907c5708611f1fa0c34c5630b7d0d259c6f126b5ebe213327bfd7d3487c169222468c9841112dfe932e3184808519f325526b0cee250fb5e039926477413fb5bf21ed49cf86d7c143c7775b5891168e76c0706bb68dec1e8175d7c4f001944c6b691cd7a5f1e591997d7e978cf30571eccdee347836fd7cd7c0f689844f4517ec21be6247a8e888c37ea8b484517884e611ac2ca36505bd4491182dec50", 0xf6}, {&(0x7f0000001b00)="80480994352ac895183260bff5379fcdd0b766ea394c621eb01fc34ef9a43f9153f3969a24e8acb8a7d1193ac4f651426053df4c2c6be520c98c8d70370e0be7f342ef04b23ebd8c82c0958588a2e4eec2fbf49a98d7ccdd3c8af8cb0dc25e5c0880b43b974e8ad850935de63dbc9dc343be48208d358f9512aceaea966da61eaa69e7cb74b091da68827af9178d7edddbab61b2c97364cfbcd87147983fdc1722130db220a5ae642a", 0xa9}], 0x4, 0x0, 0x0, 0x800}], 0x3, 0x20004000) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:56 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:33:56 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:56 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') [ 324.285756] net_ratelimit: 4 callbacks suppressed [ 324.285764] protocol 88fb is buggy, dev hsr_slave_0 [ 324.290721] protocol 88fb is buggy, dev hsr_slave_1 03:33:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:56 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:33:56 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40, 0x0) sendto$unix(r0, &(0x7f00000000c0)="3851609ced9e90affb885722c36c6ef9752f7bee8dac2e35d24e7957fa47a0b640042034808c9446d51a8c153f33bd32a6a3e1cdb27b0a148725c2e9c9e752d3226b2d180f9d00805e3a1382d36ad5b362f7bd1046ccc6bb5e", 0x59, 0x40000, &(0x7f0000000200)=@file={0x0, './file0//ile0\x00'}, 0x6e) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000040)={0x3ff, 0x101, 0x4540}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') [ 324.605687] protocol 88fb is buggy, dev hsr_slave_0 [ 324.610816] protocol 88fb is buggy, dev hsr_slave_1 03:33:57 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:57 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:57 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000500)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0x394) getgroups(0x5, &(0x7f00000003c0)=[0x0, 0xee01, 0x0, 0xffffffffffffffff, 0xee01]) write$FUSE_ATTR(r0, &(0x7f0000000480)={0x78, 0x0, 0x3, {0x554abb0e, 0x7, 0x0, {0x3, 0x4, 0x101, 0x1f, 0x1, 0x0, 0x4, 0x5, 0x9, 0x1, 0x1, r1, r2, 0xffffffffffffffff, 0x7276}}}, 0x78) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4000, 0x0) accept4(r3, &(0x7f00000000c0)=@ethernet={0x0, @dev}, &(0x7f0000000040)=0x80, 0x80000) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:57 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:57 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) 03:33:57 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:57 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000280), 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='em0\x00', 0x4, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:57 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 324.845750] protocol 88fb is buggy, dev hsr_slave_0 [ 324.850873] protocol 88fb is buggy, dev hsr_slave_1 03:33:57 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:57 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:57 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) 03:33:57 executing program 4: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:57 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:57 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r4, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ext3\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:57 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:57 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:57 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:57 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000580)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000380)="2f3aa2fbf10db6698920ba39d40ec956c54d862254ef2f2f2b6f5564f37871e02b6ba56161eaaf82bfc578577658f0fe6ed1136f8d7640b92efecb55e9852f2cd26d372f666b081aaa2e0a405f8d83719c160d9d7fa5e6e9d89e98a89b384478c5fba52b2a5e2fe1f39dbfb6e325b0505cb473ab77fe63024f36b9d7805d106fbd4f192ed43b214ab77be75df77bf22279adbf4dfadfc227ad85b269f3ddfaa79c5f87b9b3007c8abac16d9c136746", 0xaf, 0x2}], 0x810086, &(0x7f00000005c0)={[{@replayonly='replayonly'}, {@balloc_border='block-allocator=border'}, {@hash_tea='hash=tea'}, {@balloc_notest4='block-allocator=notest4'}, {@balloc_noborder='block-allocator=noborder'}, {@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@grpjquota='grpjquota'}], [{@fsname={'fsname', 0x3d, 'cpuset'}}, {@uid_lt={'uid<', r0}}, {@obj_type={'obj_type'}}, {@pcr={'pcr', 0x3d, 0x30}}, {@smackfsroot={'smackfsroot'}}]}) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') r2 = syz_open_dev$radio(&(0x7f0000000780)='/dev/radio#\x00', 0x0, 0x2) setsockopt$inet6_dccp_buf(r2, 0x21, 0xcf, &(0x7f00000007c0)="a4a36c55af013749958f7d99daa96019f57500eff37dfae99ce0f56488489915c89ee4286e1ef843e973628809a6fcaa6b9b326f21a3e0e49e9f739e97bea305821a31ce1fd461971c6e3338c377efe75e05b5e9c9468386d666417dbc1db13a123c3cbfd6e8c16c3745b45ff982879a30c61c51f9d20ef487b46eb2fc18426b957f62b4a7c8f13256872d59f78d931a058388", 0x93) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x1) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b5a7f211b8b405ba414fff77b6c39a5f645a143ce46872f6e042978d99a93dadb698610ed97a1430867af2b3b26d6aab0817dd74fbf37"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x88) bind(r1, &(0x7f00000000c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x80) 03:33:57 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) [ 325.325735] protocol 88fb is buggy, dev hsr_slave_0 [ 325.330861] protocol 88fb is buggy, dev hsr_slave_1 03:33:57 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 325.453590] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash=tea" 03:33:57 executing program 4: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:57 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r4, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:58 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:58 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 325.584000] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash=tea" 03:33:58 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r4, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0//ile0\x00', 0x0, 0x8}, 0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:58 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:58 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:58 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000000)='./file0//ile0\x00', &(0x7f00000000c0)=""/90, 0x5a) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:58 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz0\x00', {0x40, 0x9, 0x6, 0xcd9}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x5, 0x0, 0xc5d7, 0xfffffffffffffffd, 0x9, 0x3, 0x4, 0x1, 0x7, 0x7, 0x377a, 0x9, 0x30, 0x8001, 0x4, 0x0, 0x8, 0x3, 0x8001, 0x1000, 0x6, 0x7f, 0x8, 0xff, 0x400, 0x81], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast2, 0x7fffffff}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000280)=r3, 0x4) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x40, 0x0) openat$cgroup(r4, &(0x7f0000000880)='syz0\x00', 0x200002, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x8000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner'}}]}}) 03:33:58 executing program 3 (fault-call:11 fault-nth:0): openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:33:58 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:58 executing program 2 (fault-call:4 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:33:58 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000480)='/dev/admmidi#\x00', 0x9, 0x62000) openat$cgroup_type(r0, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x14dd, 0x22040) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000040)=0x1) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) r3 = add_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000380)="ced8fb116322f9174f42123120b80af4e3d103630b7029550ef32fdd311e45f570525f9e84644b041d91934905892ddc38487dbf2285ca87781136405adc49fae02c734afebfc6fd62d1f7795b1497af62695d74bd81e9d9b67736949e0f4b82f98bd905bdfc8d82fc3047577a028c5340c91146ccedb6ae62f465660b1f653c1cc23c617b", 0x85, 0xfffffffffffffffc) keyctl$get_persistent(0x16, r2, r3) rmdir(&(0x7f0000000340)='./file0//ile0\x00') [ 326.202355] FAULT_INJECTION: forcing a failure. [ 326.202355] name failslab, interval 1, probability 0, space 0, times 0 [ 326.205053] FAULT_INJECTION: forcing a failure. [ 326.205053] name failslab, interval 1, probability 0, space 0, times 0 [ 326.213845] protocol 88fb is buggy, dev hsr_slave_0 [ 326.213896] protocol 88fb is buggy, dev hsr_slave_1 [ 326.254546] CPU: 1 PID: 11486 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #84 [ 326.261846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.271682] Call Trace: [ 326.274286] dump_stack+0x172/0x1f0 [ 326.277937] should_fail.cold+0xa/0x1b [ 326.281846] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 326.286968] ? lock_downgrade+0x810/0x810 [ 326.291165] ? ___might_sleep+0x163/0x280 [ 326.295340] __should_failslab+0x121/0x190 [ 326.299587] should_failslab+0x9/0x14 [ 326.303394] __kmalloc_track_caller+0x2d8/0x740 [ 326.308071] ? __sb_end_write+0xd9/0x110 [ 326.312142] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 326.317751] ? strndup_user+0x77/0xd0 [ 326.321569] memdup_user+0x26/0xb0 [ 326.325121] strndup_user+0x77/0xd0 [ 326.328798] ksys_mount+0x3c/0x150 [ 326.332353] __x64_sys_mount+0xbe/0x150 [ 326.336344] do_syscall_64+0x103/0x610 [ 326.340239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.345525] RIP: 0033:0x457e29 [ 326.348726] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.367632] RSP: 002b:00007f52c3bd7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 326.375840] RAX: ffffffffffffffda RBX: 00007f52c3bd7c90 RCX: 0000000000457e29 [ 326.383124] RDX: 0000000020000940 RSI: 0000000020000900 RDI: 00000000200008c0 [ 326.390405] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 326.397679] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52c3bd86d4 03:33:58 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:58 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) [ 326.404973] R13: 00000000004c3c09 R14: 00000000004d6e30 R15: 0000000000000005 [ 326.433779] CPU: 0 PID: 11483 Comm: syz-executor.3 Not tainted 5.0.0-rc7+ #84 [ 326.441094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.450461] Call Trace: [ 326.453074] dump_stack+0x172/0x1f0 [ 326.456733] should_fail.cold+0xa/0x1b [ 326.460647] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 326.465774] ? lock_downgrade+0x810/0x810 [ 326.469946] ? ___might_sleep+0x163/0x280 [ 326.474125] __should_failslab+0x121/0x190 [ 326.478435] should_failslab+0x9/0x14 [ 326.482260] kmem_cache_alloc+0x2b2/0x6f0 [ 326.486438] ? wait_for_completion+0x440/0x440 [ 326.491055] getname_flags+0xd6/0x5b0 [ 326.494896] do_mkdirat+0xa0/0x2a0 [ 326.498498] ? __ia32_sys_mknod+0xb0/0xb0 [ 326.502660] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 326.507461] ? do_syscall_64+0x26/0x610 [ 326.511459] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.516840] ? do_syscall_64+0x26/0x610 [ 326.520834] ? lockdep_hardirqs_on+0x415/0x5d0 [ 326.520864] __x64_sys_mkdir+0x5c/0x80 [ 326.520900] do_syscall_64+0x103/0x610 [ 326.529395] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.538466] RIP: 0033:0x457e29 03:33:58 executing program 1: r0 = dup(0xffffffffffffff9c) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) recvfrom$llc(r0, &(0x7f00000000c0)=""/83, 0x53, 0x12040, &(0x7f0000000040)={0x1a, 0xffff, 0x2, 0x0, 0x5, 0x80, @broadcast}, 0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:33:58 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:33:59 executing program 2 (fault-call:4 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) [ 326.538485] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.538496] RSP: 002b:00007fcaa5acfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 326.538514] RAX: ffffffffffffffda RBX: 00007fcaa5acfc90 RCX: 0000000000457e29 [ 326.538525] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 326.538541] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 326.538553] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcaa5ad06d4 [ 326.560635] R13: 00000000004bd5a6 R14: 00000000004d6c50 R15: 0000000000000007 03:33:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f0000000280)='./file0//ile0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000380)=@v2={0x2000000, [{0x7, 0x2}, {0x9, 0x1f}]}, 0x14, 0x3) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000440)='qnx6\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000080)='./file0//ile0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="e9bfec30445ff78e38d9e74b519cd51c970c2d24ff3b654f879587bf2caa261d9a654f034a91a062a5c65977d4fe7fb6508f2eab93944f44973c7a57935089989e56e7575d5961df3d3ebfd0aa66ad30ab68a9d248a670f00a05d64401e59ebfc3616cf12a6a8d2a4cfab3086c8e3a960a3b979df99760e1180466b67bff0116f582cb14116786da291ab940", 0x8c, 0x40}], 0x1800080, &(0x7f0000000240)='qnx6\x00') 03:33:59 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 326.740578] FAULT_INJECTION: forcing a failure. [ 326.740578] name failslab, interval 1, probability 0, space 0, times 0 [ 326.779758] CPU: 0 PID: 11507 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #84 [ 326.787065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.796440] Call Trace: [ 326.799060] dump_stack+0x172/0x1f0 [ 326.802734] should_fail.cold+0xa/0x1b [ 326.806659] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 326.811794] ? lock_downgrade+0x810/0x810 [ 326.816010] ? ___might_sleep+0x163/0x280 [ 326.820218] __should_failslab+0x121/0x190 [ 326.824480] should_failslab+0x9/0x14 [ 326.828293] __kmalloc_track_caller+0x2d8/0x740 [ 326.833035] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 326.838586] ? strndup_user+0x77/0xd0 [ 326.842379] memdup_user+0x26/0xb0 [ 326.845911] strndup_user+0x77/0xd0 [ 326.849533] ksys_mount+0x7b/0x150 [ 326.853074] __x64_sys_mount+0xbe/0x150 [ 326.857064] do_syscall_64+0x103/0x610 [ 326.860980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.866191] RIP: 0033:0x457e29 [ 326.869406] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:33:59 executing program 4 (fault-call:12 fault-nth:0): openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:33:59 executing program 3 (fault-call:11 fault-nth:1): openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:33:59 executing program 2 (fault-call:4 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) [ 326.888325] RSP: 002b:00007f52c3bd7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 326.896056] RAX: ffffffffffffffda RBX: 00007f52c3bd7c90 RCX: 0000000000457e29 [ 326.903360] RDX: 0000000020000940 RSI: 0000000020000900 RDI: 00000000200008c0 [ 326.910645] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 326.917915] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52c3bd86d4 [ 326.925233] R13: 00000000004c3c09 R14: 00000000004d6e30 R15: 0000000000000005 03:33:59 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:33:59 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 327.083444] FAULT_INJECTION: forcing a failure. [ 327.083444] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 327.095291] CPU: 1 PID: 11527 Comm: syz-executor.3 Not tainted 5.0.0-rc7+ #84 [ 327.102585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.111994] Call Trace: [ 327.114632] dump_stack+0x172/0x1f0 [ 327.118309] should_fail.cold+0xa/0x1b [ 327.122244] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 327.127392] should_fail_alloc_page+0x50/0x60 [ 327.131937] __alloc_pages_nodemask+0x1a1/0x710 [ 327.136654] ? proc_cwd_link+0x1d0/0x1d0 [ 327.140753] ? __alloc_pages_slowpath+0x2900/0x2900 [ 327.145794] ? find_held_lock+0x35/0x130 [ 327.149913] cache_grow_begin+0x9c/0x8c0 [ 327.154007] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.159561] ? check_preemption_disabled+0x48/0x290 [ 327.159594] kmem_cache_alloc+0x62d/0x6f0 [ 327.159617] ? wait_for_completion+0x440/0x440 [ 327.159654] getname_flags+0xd6/0x5b0 [ 327.159685] do_mkdirat+0xa0/0x2a0 [ 327.159710] ? __ia32_sys_mknod+0xb0/0xb0 [ 327.177753] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 327.177773] ? do_syscall_64+0x26/0x610 [ 327.177791] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.177807] ? do_syscall_64+0x26/0x610 [ 327.185503] ? lockdep_hardirqs_on+0x415/0x5d0 [ 327.185535] __x64_sys_mkdir+0x5c/0x80 [ 327.185557] do_syscall_64+0x103/0x610 [ 327.194277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.194294] RIP: 0033:0x457e29 [ 327.194313] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.194323] RSP: 002b:00007fcaa5acfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 327.194342] RAX: ffffffffffffffda RBX: 00007fcaa5acfc90 RCX: 0000000000457e29 [ 327.231509] FAULT_INJECTION: forcing a failure. [ 327.231509] name failslab, interval 1, probability 0, space 0, times 0 [ 327.243272] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 327.243284] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 03:33:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0//ile0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000200)={0x0, @bt={0x2, 0xffff, 0x0, 0x2, 0x6, 0x80, 0xffff, 0x9, 0x7, 0x10000, 0x40000000000000, 0x5, 0x7f, 0x58, 0x8, 0x10}}) rmdir(&(0x7f0000000340)='./file0//ile0\x00') [ 327.243295] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcaa5ad06d4 [ 327.243306] R13: 00000000004bd5a6 R14: 00000000004d6c50 R15: 0000000000000007 [ 327.303959] FAULT_INJECTION: forcing a failure. [ 327.303959] name failslab, interval 1, probability 0, space 0, times 0 [ 327.315460] CPU: 1 PID: 11525 Comm: syz-executor.4 Not tainted 5.0.0-rc7+ #84 [ 327.322745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.322753] Call Trace: [ 327.322779] dump_stack+0x172/0x1f0 [ 327.322812] should_fail.cold+0xa/0x1b [ 327.342259] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 327.347392] ? lock_downgrade+0x810/0x810 [ 327.351567] ? ___might_sleep+0x163/0x280 [ 327.355763] __should_failslab+0x121/0x190 [ 327.360053] should_failslab+0x9/0x14 [ 327.363870] kmem_cache_alloc+0x2b2/0x6f0 [ 327.368087] ? wait_for_completion+0x440/0x440 [ 327.373416] getname_flags+0xd6/0x5b0 [ 327.377260] do_mkdirat+0xa0/0x2a0 [ 327.380819] ? __ia32_sys_mknod+0xb0/0xb0 [ 327.384979] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 327.389747] ? do_syscall_64+0x26/0x610 [ 327.393732] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.399106] ? do_syscall_64+0x26/0x610 [ 327.403116] ? lockdep_hardirqs_on+0x415/0x5d0 [ 327.407732] __x64_sys_mkdir+0x5c/0x80 [ 327.411637] do_syscall_64+0x103/0x610 [ 327.415544] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.420742] RIP: 0033:0x457e29 [ 327.423962] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.442872] RSP: 002b:00007feff82fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 327.450590] RAX: ffffffffffffffda RBX: 00007feff82fcc90 RCX: 0000000000457e29 [ 327.457865] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 327.465145] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 327.472891] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feff82fd6d4 03:33:59 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10000, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000040)=0xfffffffffffffff7) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f00000000c0)='./file0//ile0\x00') ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) [ 327.480181] R13: 00000000004bd5a6 R14: 00000000004d6c50 R15: 0000000000000007 03:33:59 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 327.529992] CPU: 1 PID: 11540 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #84 [ 327.537327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.546679] Call Trace: [ 327.549294] dump_stack+0x172/0x1f0 [ 327.552958] should_fail.cold+0xa/0x1b [ 327.556867] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 327.561977] ? lock_downgrade+0x810/0x810 [ 327.566132] ? ___might_sleep+0x163/0x280 [ 327.570839] __should_failslab+0x121/0x190 [ 327.575081] should_failslab+0x9/0x14 [ 327.578916] kmem_cache_alloc+0x2b2/0x6f0 [ 327.583096] ? perf_trace_lock_acquire+0xf5/0x580 [ 327.587956] getname_flags+0xd6/0x5b0 [ 327.591773] user_path_at_empty+0x2f/0x50 [ 327.595954] do_mount+0x15e/0x2d30 [ 327.599526] ? copy_mount_string+0x40/0x40 [ 327.603776] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.609378] ? _copy_from_user+0xdd/0x150 [ 327.613543] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.619087] ? copy_mount_options+0x30e/0x440 [ 327.623594] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 03:34:00 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 327.629145] ksys_mount+0xdb/0x150 [ 327.632707] __x64_sys_mount+0xbe/0x150 [ 327.636698] do_syscall_64+0x103/0x610 [ 327.640600] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.645793] RIP: 0033:0x457e29 [ 327.649007] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.667927] RSP: 002b:00007f52c3bd7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 327.667959] RAX: ffffffffffffffda RBX: 00007f52c3bd7c90 RCX: 0000000000457e29 [ 327.667968] RDX: 0000000020000940 RSI: 0000000020000900 RDI: 00000000200008c0 [ 327.667977] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 327.667986] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52c3bd86d4 [ 327.667996] R13: 00000000004c3c09 R14: 00000000004d6e30 R15: 0000000000000005 03:34:00 executing program 2 (fault-call:4 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:00 executing program 3 (fault-call:11 fault-nth:2): openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:34:00 executing program 4 (fault-call:12 fault-nth:1): openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:34:00 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 327.861406] FAULT_INJECTION: forcing a failure. [ 327.861406] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 327.873270] CPU: 0 PID: 11560 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #84 [ 327.880572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.889971] Call Trace: [ 327.892588] dump_stack+0x172/0x1f0 [ 327.896260] should_fail.cold+0xa/0x1b [ 327.900199] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 327.905355] should_fail_alloc_page+0x50/0x60 [ 327.909869] __alloc_pages_nodemask+0x1a1/0x710 [ 327.914568] ? __alloc_pages_slowpath+0x2900/0x2900 [ 327.919615] ? find_held_lock+0x35/0x130 [ 327.923743] cache_grow_begin+0x9c/0x8c0 [ 327.927833] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.933394] ? check_preemption_disabled+0x48/0x290 [ 327.938449] kmem_cache_alloc+0x62d/0x6f0 [ 327.942676] getname_flags+0xd6/0x5b0 [ 327.946512] user_path_at_empty+0x2f/0x50 [ 327.950687] do_mount+0x15e/0x2d30 [ 327.954264] ? copy_mount_string+0x40/0x40 [ 327.958525] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.964082] ? _copy_from_user+0xdd/0x150 [ 327.968252] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.973808] ? copy_mount_options+0x30e/0x440 [ 327.978319] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.983892] ksys_mount+0xdb/0x150 [ 327.987478] __x64_sys_mount+0xbe/0x150 [ 327.991497] do_syscall_64+0x103/0x610 [ 327.995413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.000625] RIP: 0033:0x457e29 [ 328.003833] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.022864] RSP: 002b:00007f52c3bd7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 328.030585] RAX: ffffffffffffffda RBX: 00007f52c3bd7c90 RCX: 0000000000457e29 [ 328.037867] RDX: 0000000020000940 RSI: 0000000020000900 RDI: 00000000200008c0 [ 328.045147] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 328.052446] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52c3bd86d4 03:34:00 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:00 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x52e4, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:34:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x121000, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000040)={0x5}) [ 328.059729] R13: 00000000004c3c09 R14: 00000000004d6e30 R15: 0000000000000005 03:34:00 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:34:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0//ile0\x00', 0x80) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') chmod(&(0x7f0000000000)='./file0//ile0\x00', 0x2) 03:34:00 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:00 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) [ 328.276031] 9pnet_virtio: no channels available for device 127.0.0.1 03:34:00 executing program 2 (fault-call:4 fault-nth:4): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:00 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:00 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:34:00 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:00 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:34:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0x6e) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) sched_getparam(r1, &(0x7f0000000200)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') [ 328.459842] FAULT_INJECTION: forcing a failure. [ 328.459842] name failslab, interval 1, probability 0, space 0, times 0 [ 328.514218] CPU: 0 PID: 11603 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #84 [ 328.521548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.530922] Call Trace: [ 328.533533] dump_stack+0x172/0x1f0 [ 328.533571] should_fail.cold+0xa/0x1b [ 328.541097] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 328.546224] ? lock_downgrade+0x810/0x810 [ 328.550397] ? ___might_sleep+0x163/0x280 [ 328.554586] __should_failslab+0x121/0x190 [ 328.558851] should_failslab+0x9/0x14 03:34:01 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x3) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) [ 328.562672] __kmalloc_track_caller+0x2d8/0x740 [ 328.567362] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 328.572836] ? alloc_vfsmnt+0x28/0x780 [ 328.576751] ? kstrdup_const+0x66/0x80 [ 328.580667] kstrdup+0x3a/0x70 [ 328.583877] kstrdup_const+0x66/0x80 [ 328.583899] alloc_vfsmnt+0xba/0x780 [ 328.583926] vfs_kern_mount.part.0+0x2a/0x410 [ 328.583956] do_mount+0x581/0x2d30 [ 328.599417] ? copy_mount_string+0x40/0x40 [ 328.603698] ? _copy_from_user+0xdd/0x150 [ 328.607876] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 328.613449] ? copy_mount_options+0x30e/0x440 [ 328.617965] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 328.623532] ksys_mount+0xdb/0x150 [ 328.627102] __x64_sys_mount+0xbe/0x150 [ 328.631143] do_syscall_64+0x103/0x610 [ 328.631184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.631200] RIP: 0033:0x457e29 [ 328.631219] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:34:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x4000, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') [ 328.631231] RSP: 002b:00007f52c3bd7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 328.631253] RAX: ffffffffffffffda RBX: 00007f52c3bd7c90 RCX: 0000000000457e29 [ 328.662446] RDX: 0000000020000940 RSI: 0000000020000900 RDI: 00000000200008c0 [ 328.662459] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 328.662471] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52c3bd86d4 [ 328.662483] R13: 00000000004c3c09 R14: 00000000004d6e30 R15: 0000000000000005 03:34:01 executing program 2 (fault-call:4 fault-nth:5): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:01 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1000000) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:34:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) r0 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@nl=@unspec, &(0x7f00000000c0)=0x80) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000100)=0x1000481, 0x4) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:34:01 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:01 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x4) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:01 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000140)={0x0, 0x5}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000200)='./file0//ile0\x00') r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x10002, 0x0) unlink(&(0x7f0000000240)='./file0\x00') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) ioctl$SIOCNRDECOBS(r2, 0x89e2) ioctl$KDDISABIO(r2, 0x4b37) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x2) [ 328.916834] FAULT_INJECTION: forcing a failure. [ 328.916834] name failslab, interval 1, probability 0, space 0, times 0 [ 328.942355] CPU: 0 PID: 11637 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #84 [ 328.949672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.959044] Call Trace: [ 328.961662] dump_stack+0x172/0x1f0 [ 328.965315] should_fail.cold+0xa/0x1b [ 328.969201] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 328.974299] ? lock_downgrade+0x810/0x810 [ 328.978448] ? ___might_sleep+0x163/0x280 [ 328.982591] __should_failslab+0x121/0x190 [ 328.986824] should_failslab+0x9/0x14 [ 328.990619] kmem_cache_alloc+0x2b2/0x6f0 [ 328.994771] alloc_inode+0xb8/0x190 [ 328.998403] iget_locked+0x196/0x4a0 [ 329.002175] kernfs_get_inode+0x4e/0x580 [ 329.006237] kernfs_iop_lookup+0x1ab/0x230 [ 329.010466] __lookup_slow+0x27e/0x500 [ 329.014347] ? vfs_unlink+0x500/0x500 [ 329.018179] lookup_slow+0x58/0x80 [ 329.021716] walk_component+0x74b/0x2000 [ 329.025768] ? inode_permission+0xb4/0x570 [ 329.029995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.035531] ? path_init+0x18f0/0x18f0 [ 329.039431] ? walk_component+0x2000/0x2000 [ 329.043764] ? __kasan_kmalloc.constprop.0+0x80/0xe0 [ 329.048871] path_lookupat.isra.0+0x1f5/0x8d0 [ 329.053374] ? path_parentat.isra.0+0x160/0x160 [ 329.058052] ? cache_grow_end+0xa4/0x190 [ 329.062104] ? find_held_lock+0x35/0x130 [ 329.066163] ? cache_grow_end+0xa4/0x190 [ 329.070224] filename_lookup+0x1b0/0x410 [ 329.074279] ? filename_parentat.isra.0+0x410/0x410 [ 329.079299] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 329.084859] ? __phys_addr_symbol+0x30/0x70 [ 329.089180] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 329.094195] ? __check_object_size+0x3d/0x42f [ 329.098690] ? strncpy_from_user+0x2a8/0x380 [ 329.103094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.108623] ? getname_flags+0x277/0x5b0 [ 329.112683] user_path_at_empty+0x43/0x50 [ 329.116845] do_mount+0x15e/0x2d30 [ 329.120405] ? copy_mount_string+0x40/0x40 [ 329.124659] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 329.130207] ? _copy_from_user+0xdd/0x150 [ 329.134356] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 329.139885] ? copy_mount_options+0x30e/0x440 [ 329.144373] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 329.149904] ksys_mount+0xdb/0x150 [ 329.153451] __x64_sys_mount+0xbe/0x150 [ 329.157433] do_syscall_64+0x103/0x610 [ 329.161337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.166523] RIP: 0033:0x457e29 [ 329.169706] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.188594] RSP: 002b:00007f52c3bd7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 329.196291] RAX: ffffffffffffffda RBX: 00007f52c3bd7c90 RCX: 0000000000457e29 [ 329.203551] RDX: 0000000020000940 RSI: 0000000020000900 RDI: 00000000200008c0 [ 329.210808] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 329.218065] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52c3bd86d4 [ 329.225325] R13: 00000000004c3c09 R14: 00000000004d6e30 R15: 0000000000000005 03:34:01 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:34:01 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:01 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2000000) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:34:01 executing program 2 (fault-call:4 fault-nth:6): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0\x00') 03:34:01 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:01 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x5) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) [ 329.480426] FAULT_INJECTION: forcing a failure. [ 329.480426] name failslab, interval 1, probability 0, space 0, times 0 [ 329.496726] CPU: 0 PID: 11665 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #84 [ 329.504035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.513407] Call Trace: [ 329.516036] dump_stack+0x172/0x1f0 [ 329.519714] should_fail.cold+0xa/0x1b [ 329.523667] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 329.528806] ? lock_downgrade+0x810/0x810 [ 329.532992] ? ___might_sleep+0x163/0x280 [ 329.537172] __should_failslab+0x121/0x190 [ 329.541443] should_failslab+0x9/0x14 [ 329.545311] __kmalloc_track_caller+0x2d8/0x740 [ 329.550004] ? mark_held_locks+0x100/0x100 [ 329.554351] ? v9fs_session_init+0xae/0x18d0 [ 329.558797] kstrdup+0x3a/0x70 [ 329.562053] v9fs_session_init+0xae/0x18d0 [ 329.566331] ? find_held_lock+0x35/0x130 [ 329.570438] ? fs_reclaim_acquire+0x20/0x20 [ 329.574780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:34:02 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) linkat(r1, &(0x7f0000000040)='./file0//ile0\x00', r0, &(0x7f00000000c0)='./file0//ile0\x00', 0x1400) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:34:02 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:02 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x8cffffff) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) [ 329.580335] ? should_fail+0x14d/0x85c [ 329.584246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.589798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.595354] ? v9fs_show_options+0x7e0/0x7e0 [ 329.599793] ? v9fs_mount+0x5e/0x920 [ 329.603558] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 329.609056] ? rcu_read_lock_sched_held+0x110/0x130 [ 329.614095] ? kmem_cache_alloc_trace+0x354/0x760 [ 329.619029] v9fs_mount+0x7d/0x920 [ 329.622589] ? pcpu_balance_workfn+0x12a0/0x12a0 03:34:02 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:02 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 329.627361] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 329.632878] mount_fs+0x106/0x3ff [ 329.636356] ? emergency_thaw_all+0x1a0/0x1a0 [ 329.640981] ? __init_waitqueue_head+0x36/0x90 [ 329.645619] vfs_kern_mount.part.0+0x6f/0x410 [ 329.650182] do_mount+0x581/0x2d30 [ 329.653765] ? copy_mount_string+0x40/0x40 [ 329.658053] ? _copy_from_user+0xdd/0x150 [ 329.662233] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 329.667797] ? copy_mount_options+0x30e/0x440 [ 329.672308] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 329.677866] ksys_mount+0xdb/0x150 [ 329.681459] __x64_sys_mount+0xbe/0x150 [ 329.685470] do_syscall_64+0x103/0x610 [ 329.689390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.694597] RIP: 0033:0x457e29 [ 329.697806] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.716721] RSP: 002b:00007f52c3bd7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 329.724452] RAX: ffffffffffffffda RBX: 00007f52c3bd7c90 RCX: 0000000000457e29 [ 329.731750] RDX: 0000000020000940 RSI: 0000000020000900 RDI: 00000000200008c0 [ 329.739045] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 329.746316] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52c3bd86d4 [ 329.753588] R13: 00000000004c3c09 R14: 00000000004d6e30 R15: 0000000000000005 03:34:02 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x8, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:34:02 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:02 executing program 2 (fault-call:4 fault-nth:7): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:02 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x6) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x440000, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x5, 0x6, 0x2, 0x22, 0x7}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000240)={r1, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x5, 0x8, 0x8, 0x9, 0xfff}, &(0x7f0000000340)=0x98) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x4, &(0x7f0000000040)=[{0xfffffffffffffff9, 0xffffffffffffffff, 0x7, 0x785}, {0x6b, 0x7fff, 0x1, 0x100000001}, {0x6, 0xfffffffffffffffc, 0x7, 0xdc51}, {0x2, 0x6, 0x0, 0x5}]}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) 03:34:02 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 329.999722] FAULT_INJECTION: forcing a failure. [ 329.999722] name failslab, interval 1, probability 0, space 0, times 0 [ 330.069084] CPU: 1 PID: 11699 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #84 [ 330.076435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.085796] Call Trace: [ 330.088443] dump_stack+0x172/0x1f0 [ 330.092105] should_fail.cold+0xa/0x1b [ 330.096031] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 330.101141] ? lock_downgrade+0x810/0x810 [ 330.105314] ? ___might_sleep+0x163/0x280 [ 330.109497] __should_failslab+0x121/0x190 [ 330.113746] should_failslab+0x9/0x14 [ 330.117558] __kmalloc_track_caller+0x2d8/0x740 [ 330.122236] ? mark_held_locks+0x100/0x100 [ 330.126484] ? v9fs_session_init+0xae/0x18d0 [ 330.130913] kstrdup+0x3a/0x70 [ 330.134124] v9fs_session_init+0xae/0x18d0 [ 330.138388] ? find_held_lock+0x35/0x130 [ 330.142453] ? fs_reclaim_acquire+0x20/0x20 [ 330.146780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.152323] ? should_fail+0x14d/0x85c [ 330.156253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.162014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.167559] ? v9fs_show_options+0x7e0/0x7e0 [ 330.171978] ? v9fs_mount+0x5e/0x920 [ 330.175704] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 330.181176] ? rcu_read_lock_sched_held+0x110/0x130 [ 330.186217] ? kmem_cache_alloc_trace+0x354/0x760 [ 330.191071] v9fs_mount+0x7d/0x920 [ 330.194614] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 330.199375] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 330.204841] mount_fs+0x106/0x3ff [ 330.208324] ? emergency_thaw_all+0x1a0/0x1a0 [ 330.212845] ? __init_waitqueue_head+0x36/0x90 [ 330.217443] vfs_kern_mount.part.0+0x6f/0x410 [ 330.221957] do_mount+0x581/0x2d30 [ 330.225516] ? copy_mount_string+0x40/0x40 [ 330.229768] ? _copy_from_user+0xdd/0x150 [ 330.233942] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 330.239488] ? copy_mount_options+0x30e/0x440 [ 330.244000] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 330.249563] ksys_mount+0xdb/0x150 [ 330.253113] __x64_sys_mount+0xbe/0x150 [ 330.257606] do_syscall_64+0x103/0x610 [ 330.261535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.266731] RIP: 0033:0x457e29 [ 330.269935] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.288836] RSP: 002b:00007f52c3bd7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 330.296976] RAX: ffffffffffffffda RBX: 00007f52c3bd7c90 RCX: 0000000000457e29 [ 330.304243] RDX: 0000000020000940 RSI: 0000000020000900 RDI: 00000000200008c0 [ 330.311512] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 03:34:02 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xebffffff) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) [ 330.318835] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52c3bd86d4 [ 330.326098] R13: 00000000004c3c09 R14: 00000000004d6e30 R15: 0000000000000005 03:34:02 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') unlinkat(r0, &(0x7f0000000000)='./file0//ile0\x00', 0x0) 03:34:02 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x7) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:02 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:02 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 330.525750] net_ratelimit: 12 callbacks suppressed [ 330.525758] protocol 88fb is buggy, dev hsr_slave_0 [ 330.535955] protocol 88fb is buggy, dev hsr_slave_1 03:34:03 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x3e, 0x0, 0x52e4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:34:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r1, 0x2}}, 0x18) 03:34:03 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:03 executing program 2 (fault-call:4 fault-nth:8): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:03 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xf6ffffff) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:34:03 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x8) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) setpriority(0x2, r0, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, r1, &(0x7f0000000200)=""/154, 0x9a) 03:34:03 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:03 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x0, 0x0, 0x52e4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:34:03 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 330.998659] FAULT_INJECTION: forcing a failure. [ 330.998659] name failslab, interval 1, probability 0, space 0, times 0 03:34:03 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x10) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:03 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 331.071097] CPU: 0 PID: 11762 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #84 [ 331.078416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.087787] Call Trace: [ 331.090421] dump_stack+0x172/0x1f0 [ 331.094105] should_fail.cold+0xa/0x1b [ 331.098043] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 331.103171] ? lock_downgrade+0x810/0x810 [ 331.107344] ? ___might_sleep+0x163/0x280 [ 331.111523] __should_failslab+0x121/0x190 [ 331.115788] should_failslab+0x9/0x14 03:34:03 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x2000, 0x0) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000140)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80202, 0x0) ioctl$VIDIOC_G_EDID(r2, 0xc0285628, &(0x7f00000000c0)={0x0, 0x803, 0x6, [], &(0x7f0000000040)=0x401}) rmdir(&(0x7f0000000340)='./file0//ile0\x00') fcntl$getflags(r0, 0x3) 03:34:03 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 331.119614] __kmalloc_track_caller+0x2d8/0x740 [ 331.124312] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 331.129780] ? alloc_vfsmnt+0x28/0x780 [ 331.133687] ? kstrdup_const+0x66/0x80 [ 331.137601] kstrdup+0x3a/0x70 [ 331.140813] kstrdup_const+0x66/0x80 [ 331.144547] alloc_vfsmnt+0xba/0x780 [ 331.148292] vfs_kern_mount.part.0+0x2a/0x410 [ 331.152820] do_mount+0x581/0x2d30 [ 331.156404] ? copy_mount_string+0x40/0x40 [ 331.160712] ? _copy_from_user+0xdd/0x150 [ 331.164889] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 03:34:03 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 331.170616] ? copy_mount_options+0x30e/0x440 [ 331.175133] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 331.180704] ksys_mount+0xdb/0x150 [ 331.184269] __x64_sys_mount+0xbe/0x150 [ 331.188272] do_syscall_64+0x103/0x610 [ 331.192202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.197411] RIP: 0033:0x457e29 [ 331.200625] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.219539] RSP: 002b:00007f52c3bd7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 331.227256] RAX: ffffffffffffffda RBX: 00007f52c3bd7c90 RCX: 0000000000457e29 [ 331.227269] RDX: 0000000020000940 RSI: 0000000020000900 RDI: 00000000200008c0 [ 331.227281] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 331.227294] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52c3bd86d4 [ 331.241836] R13: 00000000004c3c09 R14: 00000000004d6e30 R15: 0000000000000005 03:34:03 executing program 2 (fault-call:4 fault-nth:9): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:03 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:03 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xffffff8c) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:34:03 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x0, 0x0, 0x52e4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:34:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x101, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000200)={0xffffffff00000000, 0x0, 0x3, {0x7, @pix_mp={0x5, 0xfffffffffffffffa, 0x34325258, 0x9259ee51f0755e1a, 0x0, [{0x100000000, 0x22451ef8}, {0x5, 0x218}, {0xffff, 0x5}, {0x1, 0x7}, {0x40, 0x2}, {0xffff, 0x2}, {0xfffffffffffffffd, 0x1}, {0x9, 0x7c}], 0x3, 0x8, 0x0, 0x3, 0x3}}}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:34:03 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:03 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x30) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) [ 331.499014] FAULT_INJECTION: forcing a failure. [ 331.499014] name failslab, interval 1, probability 0, space 0, times 0 [ 331.589086] CPU: 1 PID: 11800 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #84 [ 331.596415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.605782] Call Trace: [ 331.608394] dump_stack+0x172/0x1f0 [ 331.612038] should_fail.cold+0xa/0x1b [ 331.615975] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 331.621090] ? lock_downgrade+0x810/0x810 [ 331.625246] ? ___might_sleep+0x163/0x280 [ 331.629403] __should_failslab+0x121/0x190 [ 331.633653] should_failslab+0x9/0x14 [ 331.637490] kmem_cache_alloc_trace+0x2d1/0x760 [ 331.642175] ? find_held_lock+0x35/0x130 [ 331.646244] ? fs_reclaim_acquire+0x20/0x20 [ 331.650571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.656162] p9_client_create+0xcb/0x1400 [ 331.660819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.666377] ? p9_client_zc_rpc.constprop.0+0x10c0/0x10c0 [ 331.671921] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 331.677391] ? rcu_read_lock_sched_held+0x110/0x130 [ 331.682430] ? __kmalloc_track_caller+0x5d1/0x740 [ 331.687281] ? lockdep_init_map+0x10c/0x5b0 [ 331.691627] v9fs_session_init+0x1e7/0x18d0 [ 331.695970] ? v9fs_session_init+0x1e7/0x18d0 [ 331.700470] ? find_held_lock+0x35/0x130 [ 331.704557] ? fs_reclaim_acquire+0x20/0x20 [ 331.708884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.714426] ? should_fail+0x14d/0x85c [ 331.714448] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.714466] ? v9fs_show_options+0x7e0/0x7e0 [ 331.714483] ? v9fs_mount+0x5e/0x920 [ 331.731998] ? rcu_lockdep_current_cpu_online+0xe3/0x130 03:34:04 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x80402, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40a00, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000240)=r1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0//ile0\x00', 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x141000, 0x0) ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f00000000c0)={0x5, 0x2, @stop_pts=0x1}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x3, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:34:04 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xffffffeb) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:34:04 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:04 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x483, 0x0, 0x0, 0x52e4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) [ 331.737455] ? rcu_read_lock_sched_held+0x110/0x130 [ 331.737488] ? kmem_cache_alloc_trace+0x354/0x760 [ 331.737532] v9fs_mount+0x7d/0x920 [ 331.750913] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 331.755676] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 331.761604] mount_fs+0x106/0x3ff [ 331.765068] ? emergency_thaw_all+0x1a0/0x1a0 [ 331.769602] ? __init_waitqueue_head+0x36/0x90 [ 331.774209] vfs_kern_mount.part.0+0x6f/0x410 [ 331.778754] do_mount+0x581/0x2d30 [ 331.782318] ? copy_mount_string+0x40/0x40 03:34:04 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 331.786565] ? _copy_from_user+0xdd/0x150 [ 331.790721] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 331.796266] ? copy_mount_options+0x30e/0x440 [ 331.800795] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 331.806348] ksys_mount+0xdb/0x150 [ 331.809899] __x64_sys_mount+0xbe/0x150 [ 331.813890] do_syscall_64+0x103/0x610 [ 331.817803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.822995] RIP: 0033:0x457e29 [ 331.826197] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.845128] RSP: 002b:00007f52c3bd7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 331.852866] RAX: ffffffffffffffda RBX: 00007f52c3bd7c90 RCX: 0000000000457e29 [ 331.860633] RDX: 0000000020000940 RSI: 0000000020000900 RDI: 00000000200008c0 [ 331.867908] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 331.875192] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52c3bd86d4 [ 331.882466] R13: 00000000004c3c09 R14: 00000000004d6e30 R15: 0000000000000005 03:34:04 executing program 2 (fault-call:4 fault-nth:10): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:04 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:04 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x3c) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:04 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfffffff6) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:34:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) syz_mount_image$nfs4(&(0x7f00000002c0)='nfs4\x00', &(0x7f0000000380)='./file0//ile0\x00', 0xf7, 0x8, &(0x7f0000001840)=[{&(0x7f0000000480)="c4240e4e94ce25f061a4bfdead231c3bfe0bb68e30ba2d1c9aa21b30b93105c80d5b90d500ab9e3a49386a99b3bce0e6f2d76209b6d9265762641b6b740274fb549e512e467c3bdd4cb2b6293a372c5846fd1da6c9f66d34735e7acd8064530c6fb3f47208fd9b21fbeb255a01b2990b6b43ed229e4c01db12cf7c96a12a8f2adb4c9a98682c13f9cdded8ee786a724700d4c7a0a24aeeb64e79a27978298f3418c24523b2ae2e5cb4e1948566d2c28e2aa31b94d6e3410246fbb188811c7da5d47f71a3", 0xc4, 0x1f}, {&(0x7f0000000580)="ac1f22137532d5f282b97644a3c0d5e4f77e72b336eef99ea6865b8f34c697ff64ce64bbf5395b51e514f34018efafeb5a3b8328759182bfaa4c43294082a9c75a9df09cbe3203781e42a8b5d5e35e8a392f057c3fdbb8ada88674167ff5a0beca73ef9296affaa86539794d8187049378f00912f9b7c10e8f29d32bc82d655c89866f0006db4e51b7513777dccbfc2abd085643198efd4df7254fddf6e5b759960b0c97b6d04b04fdb8aa0e6068040926f9e8639b9c1ed7134a591bdd2bbac0def71c6878d63dfdf86ba510cbe1cbc652a658345631a3199f9636cf204b0cfe9252461a13f167aa5c12359c5d5ba1fba66014a7aa737606e0aab7ac645201a272e1960903fb791a4c28970a6773333aac94b17ce298f0e79b1715cd877af479e8ceef157646349f3911666838e870601f5fa20ee544b1f607c617799318e6d4aaf7a0b97a87ac94b6b426957f2be32da27a56b12300485fbd45754564e2e331a9aaf90f68a3ae852c5564f4dd50a89b46840b45c26cb704a5ed34bdd96168e012e756fee8025369e9f934b990c87ab9d74e4a930f546f1c76a8b2db37bb781f46f80661faa8beb87a13c0f1f9279ee95e5e1867288cd0f6a23701e379fa1cc0ea0cebc0c6a452f8fe6bacbe37499fbd34da4bbbb9a71dba38d5b757c7f51b03f3aaec5652fdfa9a86d30a944aeecc70519fc2f90e85f964457e0e21c2b85d5494b1cb5794cc11c207bbbc8628faf32c329dbde3a49b64a62d45f575e355ec9dadf3958543823a3bd551658f6f01f21e091ce6b25b9af8e3cd95c547fcbd4f4323ae8945297a1a94380a0c132a1c99035250cc1f2b1d6d04c49cdd7dbd7c5f8f4dc58ecce3f9f3ca193389180539c7dbaf1c5d30fd6241540b87e599bb744f0c69ab40007f1ebe9d18982e4dad894cc21c9610cc8f6ac2feb52d23743c3a8fd557c8ea09c512cc8d5e1e5d88bf9545b24e4c74453db256673fef2a40e799e6685c4ef0ae172234362f1b84836b7d8e94b0f41ee57887b3e221d29675ec9ca62943a4da519607f8d40b6f4d9422c31fd80b49ed06e4504bf2bfd5b1017a0248627b5e3778ca598af61cf08c6e89c6c2834d7d1567f4b3a4250d61d799b1e3bbd1234f0535b9e2995d11d356c156af1c3e440528ecb6e79bd9d20c2186db7cff85714f37f9a3c34455f6033223a39eb9f5a3375533b9a081fb3eefb771652cbe0ce5e859d01ba537b92d5ba744f1f0b70b24fe427064d4e08ee12f011193fab3afaa9f32d37632027b6672f01d822cd46f6b0bba26453014c6643012c165935ef7babd4f8a533bfe79b2dcc2a29f1f67324fae7a0e090d728ad3d364c26aa3c6ef5c475bdde8eb3883bda4e4079090342ded6894b31bcf26d92364d95ee4d35ea07c07f207e8cbf09ddb568c273d67567e778e37eaa606246f7cbe4b85509be266d112abe7afa309c60680c7aa2818eba7c194c55f049a502c2d1ed30668a687ac90393edb0c47aca290b9200ee351a0f0ac6e0abfddd69dd132c92a1db672b20fe8315b7be9b18121acdca06b74a7ed51243349457f9c278ad30424f4db00f24da66f8eea00ca6389b6fa75e06c5958f0a9a2cbfe6c804b64ff22d18a9add8e64ffb98485f29e10b6e046be70128518bccc90518d6d6f16d0112cbaecdbd16ff71df551e4a160c54dd170433dddff97b04787dc7ba7c140c2159059801ffeafb5f7dd7b5d07fdd78cbe5cec69fc327e760bba77593f2a40440ba23e9f7be09d9ed82e6913d1da6d3f7252b186e731957a378cd38271aacaa6cafecac862cc3cae466297fdfd7394828dda460a1a964e31b34558e89a060a49b530c0af430f8148f6b243dd8238d08048b2a23e83f63b38a0af1fb662bf29cd75272e0cab897ae49486c0a1c7d5aba941805e4de1d54bbe59d63740cb34a341f65edd1a6dbd0969af5bac139f0a93447a6072aebb9d8440cbbbd6839ea5f070eb8d9427c3272a7b3fafd885e005dd5c3755e32739b61cd26a28a63b6d8d78e3c202cd99ed110b8a0c038af451b2c50cd3434f5d8a94c6132f72290a84225b033c88e1a86a9c0b7c99a157f820df7b6d1ebdd54b70d70ad4b3394ddf32e78cb8bbc06d7f64afe128153d8eee8c41a6a6b6fbc0c0cc504f09a99354ae44e6a0d16f8513171a46285037871727be6f237c828da169e7cafe8b5cc070a10a6ffe6756f29cb1ade185aa790f2241d3d389c8ed9938513f783c6fb08a655eaca912f4e522108711e297b73f93b60782535d0524014e6c730207f272cc7167a7eb4428678c05aee8c43c1cd004bee7e3d4faaac1be0806335964cbfd75bbb0aef036c0624e66da554249147a0996e2ca4a47802a0b9b78786417d7ea4a6fb55c7dd7102562739a9aecc60403c6a38fecefae25c0636e4141da632fbd55490a91783c9910f8382b5e7de26c82be5d29d5e7ab11feb2684d01c28cb51f659fc3796b437a90f0486f29ff3b0a8e37bf3f7e439e6dff7a307f057d6caeb967cbfc5da211b7d271e89b913c486cfefb77f60e09337141b3c3f116b1f670d71402bee9ff32390ddc0dc168967ff668d71e789ee2fcbdc3435b98e32c589164f168626b1417956b2c39b431dc16159d199e373819e8854697a8f8b8a75cce44131527b24cf92704eec9b138afb04d5409c96eda3b6ed202ae96204436f5f06228ed59edee1db0da826d4b16b5a15a7d40523ee97f717f73058dead1907aeac399c0f9a2f318bda759184601f249ac5dabeb368b0826189184af546fe5ab1fdb3b066ec39030a5839e7edcfe4b43128b6969e81425bdb7fa82a7f4c9e2bdad285941fbcec558969e93d92c752c3dcc64f8ea7fc857c77bd07418822645d2a63234732dccf7266170cc141e91100778b1445b1dae23afe5fb22ce7330584f78df2705fc186a0d70fa235b2d8d212e8f112e0d229d646d51f6e2277e98726a322fb5b7515f2b9bb77d31c2c048c5556dcff3dff5a311bace902bec060480e5c0a9f2c8e21ed9ea580b5aaec23ee1f794555b3bd497d6c97bb4a558b17b363b0d0ec5abd3ddd9a2c5c49f604402cae16eff8569c12c77b60b4912d4adc4532451e5e39ffee7fc7356a1848c9fcd6848ba7d7aa0424c00f93cbef6c58b4908e4bb78cf129221d0308ea497329718ac017b249923ea43be3af2648ba5b13563164088461a17d94be62005615dfc3712f637b7be3c0c45164682a23a0b52908c032816d3ad46fd9f67edde430eb26eec4ad56cd6c35f1c7b1ce7c4de0e55f8f540c5cefa4eed96ebbcbfde334d2df012c5d1363c50dae4c47b0c2262715def1ad64ef4b0f2868de1defd413e52507dd47df86aeff53694fe989a32aeb1c83db4740ed49bef3d97b5c98d3f78c77e424dede4bb20e8d6ec524b2c0bce4cc4743551cfa9571a24d3c90fd658c267c048fa2da4e42c3d49b6da966608203744705a5b466067e7d5d5430d213783c6068ada68c16b831bd818d081baed4a7d44462a368dce92a1538e4527fd2a87a7fd3bf95639c5413dedcd90a2333c3bb777ce0e9c63a411f311d8616e1574d1d7bb66d6bd9381da8404964acb5925934b2f8db2fcbad077b7df005dd3eddbba810d45d93961d30109394f23b8f9728d977e97190b2511734587f04c219f8542bb0da03b07cb2e37e3631253a2b6428528160fadc0ed2b78381fa03c5b1aa0fb8ee68a2de63b46df30badd555dae7259c07895507ab02ddd1cc22dbb5f086746cc42d9452d255330b89d60469ac4af0eebf7d791c5cc0bc01c0140f9c2454f67fcd9e6a2c462feb67ab888401a06b97f40ff32b22d5d599c7d9d7451921397cbe0800ac5c82b393f5d8ae790129d4d2489cb866f9a12b4336639b103298c159c0cbc253ebe8ce80966382957c1dca382382334770664ff70151bc66f5567d29c80b941af7c9be80ed31f888f6db828497f9b0e8b28a27620d96c000aa06dddb1321997d66c7a3471b904dff99992e4a046ca162a95b130e5932b097fb15c90a425b02b98952fbf345d89452a3e852b2af3f170b77c8f11494ebcaff873a817a0825f2905e477ac67847d36e6befd55ac4e1f738e55fc0ff4262e5a45433cf2800b2f64e026e786f03d383d49a223e7759cc438190afc1fa21e4e881d0678f8fc3bdc0a9c63fb095c9b00c5bc06e4a7c1c5ebf3bdf0b913f03d0799673e5c450bd0bed3b0ab974c4fd2129b0decc4c148931e357ed49cc6287df43fb01d511614a2cb18745455329c0a528cfc2f345b616080f1760d67e4032d3a02382e199e0a42801d611beb913dbacbf55cd65e870ae0f0149df5dd03cfe4a96396b1a53bee4f0976774d932692f8f23c82c48eb75af67843ce633b0cd6c4484a06f7c41a8c9d82c46c635bf36ed260bcabb2ee98481cf4bec7fc3a41b24535eab440b35603e55ac72e4afd6a964de5077a52983b63cf0f1126c0b5ef644684db0ad499b8d6b993f9acf028fd192d7551123eb5ca8afea2497005375acc772d855ee92766a3833dff3fe43933030531a22bd349fd20134a89ca8a8e74417c3b3d21d6a6e036a75019daf8369844ab1b5df716b0b50583660e4e60d975691100cdfb16530b8d8b6d6362a327cd7fc5de3bda74cc5f020b7a5dde415f164f9e4a4c4e417f9c573a4723b6d90b1e5ebbb57b1d3fe799df0a75334abe75870fda2f1d876f6d29688aeab6dcc92f1d605acb397533fec9c5bad679118901c78cccaaf5660fd92ac3161bb7025a4c44730fee9f0ce39a4752afd1f9cad163cc088999d01113858a18025ea43b63e44914d2cec4586c68fcd59ef4e5f0d1c11d43024defa8e72f4a6e7c67e67ea0f427a868257e759cb939fea1cfbd8f5d210e914536f4036fce5af03a293adf9fc56cb755bd58c3e315525994f4f47ccff68282bfb42915d4ebea80803d506e4236f6f8bfb222fb1e2b522f551ade6fd6082abe720660a1330830c035e8463435e7c9b3a14f496f1efdc9a752c3866d5ec3caebce4efb42526cc99bde1616c0da4abcb15063075233e94061432e05146fecfc5b66551db97984f3699dde26dfe20ac45a21763d094c31b6bd86bf688b7990579a559a7c56c74a126c91d34acd66bc9ed1df58a7259a6a3a8b440892c5693f5071ae1127ce2581a58ad3cd3314b563a086d47ff5a76f9b906b0916fc991867b42dbd366575fda8574cdf156b3284f85416363fd0b3369e8a40e7c0364ab9adcbecf1b32c7539b645d780653b21ea508fe1f101e2a7f1081676e4f9f1361ae077b2ed407298773a1837b45c223f793a8dcf67c72f7bae104eb98f92631124329a3d7d9abdf694d6020bc24ec7cf98d4215834c3189f57fd922f637f584c6c8fb341e127ae339784a14ce552036ba692c6cf1c707acf8c508ddde668e1a04f4e8c38ed8d84def8141fe8b25d09fe4a0830a776c34d33692e8a76d0ac2c86b85874d65aee71535d57bf412aea220cb3460f1d799174f022274c1ee6eeb18b2c7c0c3c1b2ca7e9a437c275d368be6bd1889d0b27292e66b5bf61b0000718f18a3d727bb6f106651499031a56bff2c5c835c80ef8f6ac9874c66d11225826f5334b8520c12ba5df8d6062a15c9ec29197fe21dada90bf0f108109f5a97a2f0d84b659197ac212f52d7c2019d58834551b63f54a81b298de017410b72c994cf401977e8f1d566f16abf87ecb21761104064bdb0363fc0f59afced5a3da7fdd25f0a665668e29c7886eb1edcd599d5ef811d94708ff3aea9149e9de3541d9ced3622814868446864fba76d00d1a36d624d646", 0x1000, 0x1}, {&(0x7f00000003c0)="4b43750390cce00675c7", 0xa, 0x1}, {&(0x7f0000001580)="eebf5f16e1616d820b1525a45e905127ff1105b15781cf7d32de6b74d3c75decc22a34fcaf8bd6e82e5ca0237edbd2e59906a4d87c2e58cde3036144e2a7eaa829ff8e26e7fafc4e9793f2f3fb5296ca568adabf4b6b5520d01da8744d74e28633fee46c258db1d21c647868504049c8eca7a9ef632cd0e76fcfeb015fe591b60bddc3dc8fe570243d2e9870698290bde8292fd1224dbccf90b3", 0x9a, 0x8}, {&(0x7f0000001940)="efcc97ccd0ec55aeb4ceed0aa5b53639658b57c0cbb1d138ccb68f714910f5a5560916a0c8767f88576770d0b9908528d2c64bd478d9888b354871d362cc612193916319470deff87c4db3c2345f0930609f7d47fb567183c5e5a8061d7a0c5606c3ca5f64b427cdfb66c676bc7ececa513fb8624ef120c4ed3dd3d8f615f274e464081cfe14964c4f4ee6435f17eac9a992169dfeda63211bea250177f0f2ce4b63add6c63788755ac6ae774cd5741ff9abbaaca0537025f282634658aa550c", 0xc0, 0x5}, {&(0x7f0000001700)="3d49af1d65709b2fa519ed96f85209be0e38902051f5770c3ebf0f675b35b46df296f81a6714a4f2660be5dbce1923e2a0f31f9fd57e1c94d83ee92196eb8285de89aa2d7f9c5bf469e348f38d001b71756fdf74cc970618d795044ee857c9d3ab135d769f", 0x65, 0x7}, {&(0x7f0000000400)="24247fcf99031a7a65fe36b19efe5afba0f0dbced30de7e050d4d7dd194d2dde581bdf8c7e16d2bcca6e2dded451d6b1824d473175e6c1f5", 0x38, 0xfffffffffffffffd}, {&(0x7f0000001780)="ef500b1a8e5b242e4fe46e6c9c23ef9db073273828c327276521dff427b5be32dc7f27281dd196d535fed6e8f8e3e0693a744521ae0c2a73c80bc23467d1dc2f8edc3cfe2b23312c2eb3e6c4347f108d1b1a235f864b96e1f4977fa9671232cc7e9b7be443a9bd83e4c35c5e5ada169c21cf3a381baf5b0ffb23db1012e2978b96b303977053dadbc152bdcdf1f432ccd6cb68ba7692e61af16c49721eb2fd348d", 0xa1, 0x6}], 0x108000, &(0x7f0000001900)='smackfstransmute') mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="fe02f3d8da3be5ed565cdc79fd4b4819d2d26a851929b6", 0x17}, {&(0x7f0000000100)="0740a9790d753f8e511880cf5b7109c675a91e565019f1c419642e7c087766cf66243e1c0b3d78e89159ce22be11a8945c5743d634a403d670a3c20f46a69a6ae00da8b4aac91ffad3aa2a4f779bb6e0038652fff724bf9d653551121b12f609da5156", 0x63}], 0x10000, &(0x7f0000000240)={[{@block_validity='block_validity'}, {@discard='discard'}, {@orlov='orlov'}, {@nodelalloc='nodelalloc'}], [{@dont_hash='dont_hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'ppp1md5sumnodevmd5sum'}}, {@context={'context', 0x3d, 'root'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:34:04 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 332.122660] 9pnet_virtio: no channels available for device 127.0.0.1 03:34:04 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x3e) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:04 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x2, 0x0, 0x3e, 0x0, 0x52e4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:34:04 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 332.297143] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 03:34:04 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x100000000000000) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) [ 332.373471] 9pnet_virtio: no channels available for device 127.0.0.1 03:34:04 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:04 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xa4) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) [ 332.423544] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 332.445837] protocol 88fb is buggy, dev hsr_slave_0 [ 332.450969] protocol 88fb is buggy, dev hsr_slave_1 03:34:04 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x0, 0x0, 0x3e, 0x0, 0x52e4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:34:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='\n27.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:04 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x200000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000001340)=[{&(0x7f0000001240)="1d", 0x1}], 0x1) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000000)={0x0, 0x2710}, 0x10) recvmmsg(r1, &(0x7f000000a780)=[{{0x0, 0xfffffffffffffdd6, &(0x7f0000000400)=[{&(0x7f0000000240)=""/146, 0x92}, {&(0x7f0000000300)=""/186, 0xba}, {&(0x7f0000007300)=""/4096, 0x1000}], 0x3}}], 0x112, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') r3 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x6, 0x400000) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r4, 0xd7, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x3, @rand_addr="1689fcb26d7135fa8a32830087b919d8", 0x4}, @in={0x2, 0x4e21, @local}}}, 0x118) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f0000000140)={0x5, 0xdf, 0x2, 0x5, 0x7}) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r5) 03:34:05 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:05 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x200000000000000) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) [ 332.615715] protocol 88fb is buggy, dev hsr_slave_0 [ 332.620834] protocol 88fb is buggy, dev hsr_slave_1 [ 332.659966] 9pnet_virtio: no channels available for device [ 332.659966] 27.0.0.1 03:34:05 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xd4) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) [ 332.708348] 9pnet_virtio: no channels available for device [ 332.708348] 27.0.0.1 03:34:05 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='H27.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:05 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x5, 0x0, 0x0, 0x3e, 0x0, 0x52e4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:34:05 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x8cffffff00000000) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:34:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:34:05 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:05 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xfe) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) [ 332.973612] 9pnet_virtio: no channels available for device H27.0.0.1 [ 333.005734] protocol 88fb is buggy, dev hsr_slave_0 [ 333.010859] protocol 88fb is buggy, dev hsr_slave_1 03:34:05 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x428082, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000000c0)={0x0, 0xfff, 0x8}) [ 333.046354] 9pnet_virtio: no channels available for device H27.0.0.1 03:34:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='1\n7.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:05 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x52e4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:34:05 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xebffffff00000000) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:34:05 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x102) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) [ 333.243723] 9pnet_virtio: no channels available for device 1 [ 333.243723] 7.0.0.1 03:34:05 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0//ile0\x00') [ 333.303311] 9pnet_virtio: no channels available for device 1 [ 333.303311] 7.0.0.1 [ 333.325718] protocol 88fb is buggy, dev hsr_slave_0 [ 333.330800] protocol 88fb is buggy, dev hsr_slave_1 03:34:05 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x140) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='1H7.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:05 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xf6ffffff00000000) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:34:05 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:05 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x52e4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:34:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200000, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000400000000000000010000000000000008000000000000006367726f7570320000"], 0x31) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 03:34:06 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='12\n.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) [ 333.607238] 9pnet_virtio: no channels available for device 1H7.0.0.1 03:34:06 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x184) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:06 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0//ile0\x00', &(0x7f0000000440)='gro\x06\x002\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:34:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400840, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000040)={0x0, 0x103, 0x2, {0x96b, 0x6, 0xcc, 0x6}}) 03:34:06 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 333.771276] 9pnet_virtio: no channels available for device 12 [ 333.771276] .0.0.1 [ 333.823686] 9pnet_virtio: no channels available for device 12 [ 333.823686] .0.0.1 03:34:06 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x3, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x52e4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:34:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = syz_open_dev$usb(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0x354, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000480)={0x66, 0x0, 0x0, 0x8001}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f00000004c0)={0x4, r1, 0x10001, 0x5506}) r2 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) recvmsg$kcm(r2, &(0x7f0000000140)={&(0x7f00000000c0)=@ax25={{}, [@bcast, @remote, @bcast, @null, @default, @netrom, @rose, @rose]}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000200)=""/140, 0x8c}], 0x1, &(0x7f0000000380)=""/146, 0x92}, 0x100) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:34:06 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1a6) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:06 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='12H.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:06 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, 0x0, 0xffffffffffffffb7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) mount$overlay(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='overlay\x00', 0x40000, &(0x7f0000000200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@index_on='index=on'}, {@redirect_dir={'redirect_dir', 0x3d, './file0//ile0'}}, {@default_permissions='default_permissions'}, {@metacopy_on='metacopy=on'}, {@lowerdir={'lowerdir', 0x3d, './file1'}}, {@default_permissions='default_permissions'}, {@index_off='index=off'}], [{@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}]}) 03:34:06 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x200000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000001340)=[{&(0x7f0000001240)="1d", 0x1}], 0x1) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000000)={0x0, 0x2710}, 0x10) recvmmsg(r1, &(0x7f000000a780)=[{{0x0, 0xfffffffffffffdd6, &(0x7f0000000400)=[{&(0x7f0000000240)=""/146, 0x92}, {&(0x7f0000000300)=""/186, 0xba}, {&(0x7f0000007300)=""/4096, 0x1000}], 0x3}}], 0x112, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') r3 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x6, 0x400000) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r4, 0xd7, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x3, @rand_addr="1689fcb26d7135fa8a32830087b919d8", 0x4}, @in={0x2, 0x4e21, @local}}}, 0x118) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f0000000140)={0x5, 0xdf, 0x2, 0x5, 0x7}) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r5) 03:34:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127\n0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:06 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x1e8) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:06 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x52e4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:34:06 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="0f0000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:06 executing program 3: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000000)={0x0, 0x4}) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:34:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x2000, 0x0) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000140)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80202, 0x0) ioctl$VIDIOC_G_EDID(r2, 0xc0285628, &(0x7f00000000c0)={0x0, 0x803, 0x6, [], &(0x7f0000000040)=0x401}) rmdir(&(0x7f0000000340)='./file0//ile0\x00') fcntl$getflags(r0, 0x3) 03:34:06 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x201) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127%0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:06 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="100000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:06 executing program 1 (fault-call:4 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 334.523242] 9pnet_virtio: no channels available for device 127%0.0.1 03:34:07 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x52e4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) [ 334.565292] 9pnet_virtio: no channels available for device 127%0.0.1 03:34:07 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x204) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:07 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="1b0000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:07 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x89, 0x16c9a0000, 0x80000000, 0x6, 0x7, 0x8001, 0x9, {0x0, @in={{0x2, 0x4e21, @remote}}, 0x7, 0x5, 0x100000000, 0x88d, 0x100}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r1, 0x2e4a, 0x27b969b7, 0x0, 0x6, 0x6}, 0x14) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) clock_adjtime(0x2, &(0x7f0000000480)={0x8, 0x0, 0xf8ab, 0x2, 0x8, 0x81, 0x9, 0x1, 0xffe000000000, 0x7, 0x7c, 0x81, 0xfff, 0x3, 0x400, 0x3f, 0x8, 0x1, 0x1f, 0x0, 0x5, 0x2, 0x116c, 0x9, 0xfffffffffffffffc, 0xff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) [ 334.678472] FAULT_INJECTION: forcing a failure. [ 334.678472] name failslab, interval 1, probability 0, space 0, times 0 [ 334.736028] CPU: 1 PID: 12083 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #84 [ 334.743347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.752708] Call Trace: [ 334.755323] dump_stack+0x172/0x1f0 [ 334.759443] should_fail.cold+0xa/0x1b [ 334.763353] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 334.768471] ? lock_downgrade+0x810/0x810 [ 334.772626] ? ___might_sleep+0x163/0x280 [ 334.776782] __should_failslab+0x121/0x190 [ 334.781034] should_failslab+0x9/0x14 [ 334.784840] kmem_cache_alloc_trace+0x2d1/0x760 [ 334.789651] ? ldsem_wake+0x40/0x40 [ 334.793342] h5_open+0x4e4/0x5f0 [ 334.796729] ? h5_rx_crc+0x20/0x20 [ 334.800280] ? ___might_sleep+0x163/0x280 [ 334.804457] hci_uart_tty_ioctl+0x2d4/0xa70 [ 334.808860] tty_ioctl+0xac9/0x14d0 [ 334.812501] ? hci_uart_init_work+0x150/0x150 [ 334.817003] ? tty_vhangup+0x30/0x30 [ 334.820756] ? mark_held_locks+0x100/0x100 [ 334.825020] ? proc_fail_nth_write+0x9d/0x1e0 [ 334.829523] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:34:07 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="c00000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:07 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="c00e00001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127/0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) [ 334.835068] ? smack_log+0x415/0x540 [ 334.838790] ? smk_access_entry+0x1c0/0x1c0 [ 334.843119] ? __fget+0x340/0x540 [ 334.846582] ? smk_access+0x40d/0x570 [ 334.850390] ? find_held_lock+0x35/0x130 [ 334.854461] ? smk_tskacc+0x2ba/0x390 [ 334.858747] ? tty_vhangup+0x30/0x30 [ 334.862489] do_vfs_ioctl+0xd6e/0x1390 [ 334.866389] ? smk_curacc+0x7f/0xa0 [ 334.870027] ? ioctl_preallocate+0x210/0x210 [ 334.874444] ? smack_file_ioctl+0x196/0x300 [ 334.878779] ? smack_file_lock+0x240/0x240 [ 334.883018] ? __fget+0x367/0x540 03:34:07 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="e03f03001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 334.886506] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 334.892049] ? fput+0x128/0x1a0 [ 334.895345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.900890] ? security_file_ioctl+0x93/0xc0 [ 334.905310] ksys_ioctl+0xab/0xd0 [ 334.908775] __x64_sys_ioctl+0x73/0xb0 [ 334.912672] do_syscall_64+0x103/0x610 [ 334.916577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.921771] RIP: 0033:0x457e29 [ 334.924971] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.943883] RSP: 002b:00007f5f436aec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 334.951611] RAX: ffffffffffffffda RBX: 00007f5f436aec90 RCX: 0000000000457e29 [ 334.959345] RDX: 0000000000000002 RSI: 00000000400455c8 RDI: 0000000000000003 [ 334.966620] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 334.973892] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5f436af6d4 03:34:07 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2aa) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) [ 334.981177] R13: 00000000004c06b8 R14: 00000000004d23f0 R15: 0000000000000006 03:34:07 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="e40100201e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 335.097148] 9pnet_virtio: no channels available for device 127/0.0.1 03:34:07 executing program 1 (fault-call:4 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 03:34:07 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x53, &(0x7f0000000000), &(0x7f0000000080)=0x7) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) 03:34:07 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x52e4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) [ 335.142721] 9pnet_virtio: no channels available for device 127/0.0.1 03:34:07 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="00f0ff7f1e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:07 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x2de) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127H0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:07 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="effdffff1e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 335.293634] FAULT_INJECTION: forcing a failure. [ 335.293634] name failslab, interval 1, probability 0, space 0, times 0 [ 335.347402] CPU: 0 PID: 12124 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #84 [ 335.354721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.364174] Call Trace: [ 335.366776] dump_stack+0x172/0x1f0 [ 335.370444] should_fail.cold+0xa/0x1b [ 335.374358] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 335.379473] ? mark_held_locks+0xb1/0x100 [ 335.383631] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 335.388744] ? __debug_object_init+0x190/0xc30 [ 335.393342] __should_failslab+0x121/0x190 [ 335.397595] should_failslab+0x9/0x14 [ 335.401403] kmem_cache_alloc_node+0x56/0x710 [ 335.405904] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 335.411018] ? __debug_object_init+0x190/0xc30 [ 335.415613] __alloc_skb+0xd5/0x5e0 [ 335.419256] ? skb_scrub_packet+0x440/0x440 [ 335.423586] ? lockdep_init_map+0x10c/0x5b0 [ 335.427920] h5_link_control.isra.0+0x2f/0xa0 [ 335.432422] h5_open+0x438/0x5f0 [ 335.435803] ? h5_rx_crc+0x20/0x20 [ 335.439346] ? ___might_sleep+0x163/0x280 [ 335.443511] hci_uart_tty_ioctl+0x2d4/0xa70 [ 335.447846] tty_ioctl+0xac9/0x14d0 [ 335.451477] ? hci_uart_init_work+0x150/0x150 [ 335.455974] ? tty_vhangup+0x30/0x30 [ 335.459708] ? mark_held_locks+0x100/0x100 [ 335.463946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 335.469484] ? smack_log+0x415/0x540 [ 335.473200] ? debug_smp_processor_id+0x1c/0x20 [ 335.477875] ? smk_access_entry+0x1c0/0x1c0 [ 335.482197] ? __fget+0x340/0x540 [ 335.485651] ? smk_access+0x40d/0x570 [ 335.489461] ? find_held_lock+0x35/0x130 [ 335.493535] ? smk_tskacc+0x2ba/0x390 [ 335.497361] ? tty_vhangup+0x30/0x30 [ 335.501081] do_vfs_ioctl+0xd6e/0x1390 [ 335.505007] ? smk_curacc+0x7f/0xa0 [ 335.508643] ? ioctl_preallocate+0x210/0x210 [ 335.513053] ? smack_file_ioctl+0x196/0x300 [ 335.517378] ? smack_file_lock+0x240/0x240 [ 335.521616] ? __fget+0x367/0x540 [ 335.525089] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 335.530631] ? fput+0x128/0x1a0 [ 335.533923] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 335.539464] ? security_file_ioctl+0x93/0xc0 [ 335.543880] ksys_ioctl+0xab/0xd0 [ 335.547343] __x64_sys_ioctl+0x73/0xb0 [ 335.551263] do_syscall_64+0x103/0x610 [ 335.555192] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.560382] RIP: 0033:0x457e29 [ 335.563594] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 335.582494] RSP: 002b:00007f5f436aec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 335.590219] RAX: ffffffffffffffda RBX: 00007f5f436aec90 RCX: 0000000000457e29 [ 335.597486] RDX: 0000000000000002 RSI: 00000000400455c8 RDI: 0000000000000003 [ 335.604756] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 335.612028] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5f436af6d4 [ 335.619302] R13: 00000000004c06b8 R14: 00000000004d23f0 R15: 0000000000000006 03:34:08 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x52e4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:34:08 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000000f00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:08 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, 0x0, 0xffffffffffffff44) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0//ile0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) socket$rds(0x15, 0x5, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) [ 335.696350] 9pnet_virtio: no channels available for device 127H0.0.1 [ 335.731479] 9pnet_virtio: no channels available for device 127H0.0.1 03:34:08 executing program 1 (fault-call:4 fault-nth:2): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 03:34:08 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240200001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:08 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x300) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.\n.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) [ 335.901502] FAULT_INJECTION: forcing a failure. [ 335.901502] name failslab, interval 1, probability 0, space 0, times 0 03:34:08 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x52e4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) 03:34:08 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240300001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 335.960889] CPU: 0 PID: 12153 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #84 [ 335.968200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.977561] Call Trace: [ 335.980180] dump_stack+0x172/0x1f0 [ 335.983829] should_fail.cold+0xa/0x1b [ 335.987743] ? h5_open+0x4e4/0x5f0 [ 335.991294] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 335.996409] ? __debug_object_init+0x190/0xc30 [ 336.001032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 336.006577] ? should_fail+0x14d/0x85c [ 336.010479] __should_failslab+0x121/0x190 [ 336.014728] should_failslab+0x9/0x14 [ 336.018545] kmem_cache_alloc_node_trace+0x5a/0x720 [ 336.023586] ? __alloc_skb+0xd5/0x5e0 [ 336.027438] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 336.032904] __kmalloc_node_track_caller+0x3d/0x70 [ 336.037841] __kmalloc_reserve.isra.0+0x40/0xf0 [ 336.042518] __alloc_skb+0x10b/0x5e0 [ 336.046241] ? skb_scrub_packet+0x440/0x440 [ 336.050601] ? lockdep_init_map+0x10c/0x5b0 [ 336.054937] h5_link_control.isra.0+0x2f/0xa0 [ 336.059449] h5_open+0x438/0x5f0 [ 336.062823] ? h5_rx_crc+0x20/0x20 [ 336.066378] ? ___might_sleep+0x163/0x280 [ 336.070558] hci_uart_tty_ioctl+0x2d4/0xa70 [ 336.074894] tty_ioctl+0xac9/0x14d0 [ 336.078523] ? hci_uart_init_work+0x150/0x150 [ 336.083052] ? tty_vhangup+0x30/0x30 [ 336.086781] ? mark_held_locks+0x100/0x100 [ 336.091022] ? proc_fail_nth_write+0x9d/0x1e0 [ 336.095522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 336.101060] ? smack_log+0x415/0x540 [ 336.104785] ? smk_access_entry+0x1c0/0x1c0 [ 336.109105] ? __fget+0x340/0x540 [ 336.112573] ? smk_access+0x40d/0x570 [ 336.116391] ? find_held_lock+0x35/0x130 [ 336.120477] ? smk_tskacc+0x2ba/0x390 [ 336.124300] ? tty_vhangup+0x30/0x30 [ 336.128019] do_vfs_ioctl+0xd6e/0x1390 [ 336.131910] ? smk_curacc+0x7f/0xa0 [ 336.135541] ? ioctl_preallocate+0x210/0x210 [ 336.139950] ? smack_file_ioctl+0x196/0x300 [ 336.144277] ? smack_file_lock+0x240/0x240 [ 336.148524] ? __fget+0x367/0x540 [ 336.151991] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 336.157532] ? fput+0x128/0x1a0 [ 336.160823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 336.166617] ? security_file_ioctl+0x93/0xc0 [ 336.171032] ksys_ioctl+0xab/0xd0 [ 336.174495] __x64_sys_ioctl+0x73/0xb0 [ 336.178395] do_syscall_64+0x103/0x610 [ 336.182292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.187480] RIP: 0033:0x457e29 [ 336.190678] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:34:08 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) sendmmsg$inet_sctp(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=@in={0x2, 0x4e23, @remote}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000200)="99ef7abd1ebd088e64b5e6d21275ab76abff62e6bd1f952f5b1afcbfc4ef8bb22495d4518ce50a4d3690656fe52a41a3a50968d6309b002abe0ac48e2358040d573685605096a5c653348a48c25e631b0d17d328e2ee53de0f54c78ec76e4ff5086e1cd56daa5c253133b6a46e558188e002c4a75d7dca3f5f45fbb4b25cc8d8ab02222d0cb56d69d3bed52638c18674f588ff91d559628787344bc486ff7ad196dbceb15ff27ca22553e83e0bfae91ada66db9838a2ce2e227b66e5ffea7a", 0xbf}], 0x1, &(0x7f0000000480)=[@authinfo={0x18}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x8}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x48c05fef}}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}], 0x80, 0x80}], 0x1, 0x10) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) [ 336.209578] RSP: 002b:00007f5f436aec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 336.217320] RAX: ffffffffffffffda RBX: 00007f5f436aec90 RCX: 0000000000457e29 [ 336.224603] RDX: 0000000000000002 RSI: 00000000400455c8 RDI: 0000000000000003 [ 336.231877] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 336.239146] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5f436af6d4 [ 336.246426] R13: 00000000004c06b8 R14: 00000000004d23f0 R15: 0000000000000006 03:34:08 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240400001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 336.277338] 9pnet_virtio: no channels available for device 127. [ 336.277338] .0.1 03:34:08 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240600001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:08 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x3ae) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:08 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240800001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 336.397821] 9pnet_virtio: no channels available for device 127. [ 336.397821] .0.1 03:34:08 executing program 1 (fault-call:4 fault-nth:3): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 03:34:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.#.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) 03:34:08 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x48, r2, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf0b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0xc001) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000ac0)) [ 336.518947] FAULT_INJECTION: forcing a failure. [ 336.518947] name failslab, interval 1, probability 0, space 0, times 0 03:34:08 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000004c0)={'syz0\x00', {0x0, 0x9, 0x6}, 0x4f, [0x1, 0x2, 0x0, 0x0, 0xb6, 0x401, 0xffffffffffffff00, 0x189, 0x80000001, 0x2, 0x4, 0x2, 0x400, 0x6a6fce8a, 0x401, 0x101, 0xb834, 0x2, 0x7fffffff, 0x7f, 0x4, 0x7, 0x0, 0x8, 0x7, 0xffffffff, 0x6, 0x3f, 0x6fabedfe, 0x3f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x52e4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0xff], [0x8000, 0xd65, 0xf852, 0x3ff, 0x6b, 0x1, 0xffffffffffff8000, 0xfff, 0x1, 0x8001, 0x0, 0xa94, 0x8001, 0x9, 0x3, 0x2, 0xfffffffffffffff9, 0x8040, 0x100000000, 0x6, 0x100000001, 0x100000000, 0x2, 0x4, 0x6, 0x1, 0x100000000, 0x4, 0x3, 0xd8a9, 0xfffffffffffff000, 0x6, 0x3, 0xa5bb, 0x200, 0xc9d, 0x51, 0x40, 0x5, 0x62, 0xd05, 0x400, 0x1, 0x1, 0x8, 0x3, 0x84, 0x7f, 0x81, 0x3, 0x4, 0x4, 0xfff, 0x5, 0x9, 0x3ff, 0xb5, 0x5, 0x7f, 0x53, 0x3, 0x101, 0x7fff, 0xc68], [0x3, 0x6d9, 0x6, 0x7ff, 0x6, 0x3, 0x8, 0x0, 0x9, 0x1, 0x4, 0x1dbb, 0x8, 0x54, 0x2, 0x9, 0x6, 0x9, 0x100000000, 0x6f, 0xfffffffeffffffff, 0x9, 0x3, 0x3f, 0xfffffffffffffffe, 0x44, 0xa4b2, 0xab10, 0x7f, 0x2, 0xc4, 0x7, 0x301, 0x3, 0xfff, 0x197, 0x0, 0x8, 0x1a, 0xa87, 0x4, 0x5, 0xfffffffffffffff9, 0xffffffffffffff00, 0x2, 0x4, 0x7, 0x1f, 0x600, 0x5, 0xa82, 0x6, 0x0, 0x6, 0x2, 0x1, 0x5, 0x81, 0x20, 0x1000, 0x7, 0x400, 0xfffffffffffffffd, 0x3], [0x1, 0x401, 0xb1, 0x1, 0x0, 0x10000, 0x0, 0x1, 0x9, 0x7f, 0xfffffffffffffffc, 0x101, 0x87, 0x3a, 0x2c, 0x4, 0xfc9, 0x1, 0x7, 0x100000000, 0x0, 0x20, 0x100, 0x8, 0x6, 0x100, 0x4, 0x80, 0x376, 0x81, 0x0, 0x0, 0xfffffffffffffff9, 0x2, 0x81, 0x7, 0x3, 0x1, 0x7, 0x1, 0x3, 0x7, 0x8, 0x9, 0x4, 0x8, 0xfff, 0xa25, 0x8000, 0x1, 0x2, 0xffffffffffffffff, 0x9cc9, 0x2800000000000000, 0xfffffffffffffff8, 0xe9e9, 0xcbf, 0x4f23, 0x80, 0x7, 0x5, 0x6, 0xffffffff80000000, 0x8]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x40, 0x81, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7fffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0xfff}, 0xa) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f0000000ac0)=0xb) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x200002, &(0x7f0000000a40)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}], [{@fowner_eq={'fowner', 0x3d, r2}}]}}) [ 336.601466] 9pnet_virtio: no channels available for device 127.#.0.1 [ 336.612155] CPU: 1 PID: 12184 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #84 [ 336.619457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.628815] Call Trace: [ 336.631420] dump_stack+0x172/0x1f0 [ 336.632858] 9pnet_virtio: no channels available for device 127.#.0.1 [ 336.635068] should_fail.cold+0xa/0x1b [ 336.635092] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 336.635111] ? lock_downgrade+0x810/0x810 [ 336.635133] ? ___might_sleep+0x163/0x280 [ 336.659353] __should_failslab+0x121/0x190 [ 336.663598] should_failslab+0x9/0x14 [ 336.667403] kmem_cache_alloc_trace+0x2d1/0x760 [ 336.672074] ? h5_open+0x472/0x5f0 [ 336.675617] ? h5_rx_crc+0x20/0x20 [ 336.679169] ? ___might_sleep+0x163/0x280 [ 336.683392] hci_alloc_dev+0x43/0x1d00 [ 336.687290] hci_uart_tty_ioctl+0x321/0xa70 [ 336.691653] tty_ioctl+0xac9/0x14d0 [ 336.695286] ? hci_uart_init_work+0x150/0x150 [ 336.699785] ? tty_vhangup+0x30/0x30 [ 336.703511] ? mark_held_locks+0x100/0x100 [ 336.707751] ? proc_fail_nth_write+0x9d/0x1e0 [ 336.712248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 336.717790] ? smack_log+0x415/0x540 [ 336.721531] ? smk_access_entry+0x1c0/0x1c0 [ 336.725858] ? __fget+0x340/0x540 [ 336.729316] ? smk_access+0x40d/0x570 [ 336.733119] ? find_held_lock+0x35/0x130 [ 336.737200] ? smk_tskacc+0x2ba/0x390 [ 336.741007] ? tty_vhangup+0x30/0x30 [ 336.744725] do_vfs_ioctl+0xd6e/0x1390 [ 336.748615] ? smk_curacc+0x7f/0xa0 [ 336.752252] ? ioctl_preallocate+0x210/0x210 [ 336.757189] ? smack_file_ioctl+0x196/0x300 [ 336.761552] ? smack_file_lock+0x240/0x240 [ 336.765789] ? __fget+0x367/0x540 [ 336.769259] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 336.774802] ? fput+0x128/0x1a0 [ 336.778092] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 336.783634] ? security_file_ioctl+0x93/0xc0 [ 336.788056] ksys_ioctl+0xab/0xd0 [ 336.791516] __x64_sys_ioctl+0x73/0xb0 [ 336.795415] do_syscall_64+0x103/0x610 [ 336.799330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.804531] RIP: 0033:0x457e29 [ 336.807743] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.826754] RSP: 002b:00007f5f436aec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 336.834466] RAX: ffffffffffffffda RBX: 00007f5f436aec90 RCX: 0000000000457e29 [ 336.841734] RDX: 0000000000000002 RSI: 00000000400455c8 RDI: 0000000000000003 03:34:09 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240a00001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 336.849001] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 336.856271] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5f436af6d4 [ 336.863675] R13: 00000000004c06b8 R14: 00000000004d23f0 R15: 0000000000000006 [ 336.875959] kasan: CONFIG_KASAN_INLINE enabled [ 336.880663] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 336.896230] Bluetooth: Invalid header checksum [ 336.924764] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 336.931010] CPU: 1 PID: 17 Comm: kworker/1:0 Not tainted 5.0.0-rc7+ #84 [ 336.937752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.947130] Workqueue: events hci_uart_write_work [ 336.948951] kobject: 'loop5' (000000003299acf1): kobject_uevent_env [ 336.951985] RIP: 0010:hci_uart_write_work+0x1b6/0x710 03:34:09 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240c00001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) 03:34:09 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240e00001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 336.952000] Code: 0f 85 6a 04 00 00 49 8b b4 24 c8 00 00 00 4c 89 ef e8 ce 65 53 02 89 c6 48 8b 45 d0 48 8d b8 5c 10 00 00 48 89 f8 48 c1 e8 03 <0f> b6 14 18 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 1d [ 336.952007] RSP: 0018:ffff8880aa2cfcb0 EFLAGS: 00010203 [ 336.952020] RAX: 000000000000020b RBX: dffffc0000000000 RCX: 0000000000000000 [ 336.958521] Bluetooth: Can't allocate HCI device [ 336.963586] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000000105c [ 336.963595] RBP: ffff8880aa2cfd30 R08: ffff8880aa2c2480 R09: ffff8880aa2c2d48 [ 336.963602] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880984e15c0 03:34:09 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240f00001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 336.963616] R13: ffff88805201b5c0 R14: ffff888094bc7da8 R15: ffff8880984e1630 [ 336.987028] kobject: 'loop5' (000000003299acf1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 336.987852] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 337.046612] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 337.052490] CR2: 0000000000940004 CR3: 0000000081569000 CR4: 00000000001406e0 [ 337.059912] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 337.066517] kobject: 'loop5' (000000003299acf1): kobject_uevent_env 03:34:09 executing program 1 (fault-call:4 fault-nth:4): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 337.067197] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 337.073620] kobject: 'loop5' (000000003299acf1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 337.080853] Call Trace: [ 337.080879] process_one_work+0x98e/0x1790 [ 337.080898] ? pwq_dec_nr_in_flight+0x320/0x320 [ 337.080913] ? lock_acquire+0x16f/0x3f0 [ 337.105744] worker_thread+0x98/0xe40 [ 337.109555] kthread+0x357/0x430 [ 337.112924] ? process_one_work+0x1790/0x1790 [ 337.117423] ? kthread_cancel_delayed_work_sync+0x20/0x20 03:34:09 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) mq_open(0x0, 0x0, 0x81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x3b8) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000940)='9p\x00', 0x200002, 0x0) 03:34:09 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="241000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 337.122995] ret_from_fork+0x3a/0x50 [ 337.126715] Modules linked in: [ 337.138220] kobject: 'vet' (00000000722b1a2b): kobject_add_internal: parent: 'net', set: 'devices' [ 337.155039] kobject: 'vet' (00000000722b1a2b): kobject_uevent_env [ 337.155214] kobject: 'loop1' (0000000015be03db): kobject_uevent_env 03:34:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f00000008c0)='127.+.0.1\x00', &(0x7f0000000900)='./file0//ile0\x00', &(0x7f0000000940)='9p\x00', 0x0, 0x0) [ 337.161870] kobject: 'vet' (00000000722b1a2b): fill_kobj_path: path = '/devices/virtual/net/vet' [ 337.168535] net_ratelimit: 6 callbacks suppressed [ 337.168546] protocol 88fb is buggy, dev hsr_slave_0 [ 337.168597] protocol 88fb is buggy, dev hsr_slave_1 [ 337.194221] kobject: 'queues' (000000007d4ba564): kobject_add_internal: parent: 'vet', set: '' [ 337.195530] kobject: 'loop1' (0000000015be03db): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 337.207576] kobject: 'queues' (000000007d4ba564): kobject_uevent_env 03:34:09 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="246000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 337.216247] kobject: '(null)' (000000003e98fc29): kobject_cleanup, parent (null) [ 337.219800] kobject: 'queues' (000000007d4ba564): kobject_uevent_env: filter function caused the event to drop! [ 337.238713] kobject: 'rx-0' (000000008725581a): kobject_add_internal: parent: 'queues', set: 'queues' [ 337.240507] kobject: '(null)' (000000003e98fc29): calling ktype release [ 337.249722] kobject: 'rx-0' (000000008725581a): kobject_uevent_env [ 337.262643] kobject: 'rx-0' (000000008725581a): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 337.271601] kobject: 'loop5' (000000003299acf1): kobject_uevent_env [ 337.277826] kobject: 'tx-0' (00000000cbf45282): kobject_add_internal: parent: 'queues', set: 'queues' [ 337.289025] kobject: 'tx-0' (00000000cbf45282): kobject_uevent_env [ 337.295483] kobject: 'tx-0' (00000000cbf45282): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 337.303703] kobject: 'loop5' (000000003299acf1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 337.309057] kobject: 'batman_adv' (000000002aa91966): kobject_add_internal: parent: 'vet', set: '' 03:34:09 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="24f000001e00070400fffd946f610500020000001f00000000000800080008000400ff7e", 0x24}], 0x1}, 0x0) [ 337.325960] ---[ end trace 4ba92fc0668d60b5 ]--- [ 337.330897] RIP: 0010:hci_uart_write_work+0x1b6/0x710 [ 337.336984] Code: 0f 85 6a 04 00 00 49 8b b4 24 c8 00 00 00 4c 89 ef e8 ce 65 53 02 89 c6 48 8b 45 d0 48 8d b8 5c 10 00 00 48 89 f8 48 c1 e8 03 <0f> b6 14 18 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 1d [ 337.356551] RSP: 0018:ffff8880aa2cfcb0 EFLAGS: 00010203 [ 337.367618] RAX: 000000000000020b RBX: dffffc0000000000 RCX: 0000000000000000 [ 337.374910] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000000105c [ 337.382215] RBP: ffff8880aa2cfd30 R08: ffff8880aa2c2480 R09: ffff8880aa2c2d48 [ 337.389575] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880984e15c0 [ 337.396899] R13: ffff88805201b5c0 R14: ffff888094bc7da8 R15: ffff8880984e1630 [ 337.404189] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 337.413038] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 337.418173] kobject: 'loop5' (000000003299acf1): kobject_uevent_env [ 337.419479] CR2: 0000000020000080 CR3: 0000000008871000 CR4: 00000000001406e0 [ 337.425381] kobject: 'loop5' (000000003299acf1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 337.434213] kobject: 'loop1' (0000000015be03db): kobject_uevent_env [ 337.447365] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 337.461322] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 337.464750] kobject: 'loop1' (0000000015be03db): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 337.470515] Kernel panic - not syncing: Fatal exception [ 337.484382] Kernel Offset: disabled [ 337.488003] Rebooting in 86400 seconds..