0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2000, 0x500001c) 05:05:15 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xf6ffffff}) 05:05:16 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) [ 715.727911] audit: type=1804 audit(1544850316.001:1392): pid=11792 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/775/memory.events" dev="sda1" ino=16626 res=1 05:05:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noac*'}]}) 05:05:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x825, &(0x7f0000000240)) [ 715.890162] audit: type=1804 audit(1544850316.161:1393): pid=11801 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/980/memory.events" dev="sda1" ino=16527 res=1 05:05:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) [ 715.958856] audit: type=1804 audit(1544850316.221:1394): pid=11767 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/980/memory.events" dev="sda1" ino=16527 res=1 [ 716.075078] audit: type=1804 audit(1544850316.351:1395): pid=11816 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/981/memory.events" dev="sda1" ino=16527 res=1 05:05:16 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x20000000}) 05:05:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x82f, &(0x7f0000000240)) 05:05:16 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xedc0, 0x0, 0x0, 0x820, &(0x7f0000000240)) [ 716.225228] audit: type=1804 audit(1544850316.471:1396): pid=11820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/775/memory.events" dev="sda1" ino=16626 res=1 05:05:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3016, 0x500001c) 05:05:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noac+'}]}) [ 716.299154] audit: type=1800 audit(1544850316.531:1397): pid=11792 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor0" name="memory.events" dev="sda1" ino=16626 res=0 05:05:16 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xfffffff6}) 05:05:16 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x4000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x808, &(0x7f0000000240)) 05:05:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noac-'}]}) [ 716.742804] audit: type=1804 audit(1544850317.021:1398): pid=11856 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/981/memory.events" dev="sda1" ino=16527 res=1 05:05:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x809, &(0x7f0000000240)) [ 716.839284] audit: type=1804 audit(1544850317.111:1399): pid=11816 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/981/memory.events" dev="sda1" ino=16527 res=1 05:05:17 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xfffffff5}) 05:05:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x301c, 0x500001c) 05:05:17 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xfffffdfc, 0x0, 0x0, 0x820, &(0x7f0000000240)) [ 716.967786] audit: type=1804 audit(1544850317.241:1400): pid=11870 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/982/memory.events" dev="sda1" ino=16562 res=1 05:05:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x6000000}) 05:05:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x3f00000000000000}) 05:05:17 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xc0ed0000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:17 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x500000000000000}) 05:05:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3022, 0x500001c) 05:05:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x4}) 05:05:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x97ffffff}) 05:05:17 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x200000000000000}) 05:05:17 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xc000000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x1000000}) 05:05:18 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x40000}) 05:05:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x6c00000000000000}) 05:05:18 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xfcfdffff, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2, 0x500001c) 05:05:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x100000}) 05:05:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x1000000000}) 05:05:18 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x2d, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:18 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xf5ffffff}) 05:05:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xfcfdffff}) 05:05:18 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x1000000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x3f00000000000000}) 05:05:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x303a, 0x500001c) 05:05:18 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x3f00}) 05:05:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x300}) 05:05:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)="6d656d6f72792e6576656e747315", 0x3000, 0x500001c) 05:05:19 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x2000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x7400000000000000}) 05:05:19 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x5}) 05:05:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xc0}) 05:05:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events*', 0x3000, 0x500001c) 05:05:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)="6d656d6f72792e6576656e7473fb", 0x3000, 0x500001c) 05:05:19 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x2000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x301a, 0x500001c) 05:05:19 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x100000000000000}) 05:05:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.eventsz', 0x3000, 0x500001c) 05:05:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x400000000000000}) 05:05:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x5}) 05:05:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)="6d656d6f72792e6576656e747319", 0x3000, 0x500001c) 05:05:19 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x48, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:19 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x2d00000000000000}) 05:05:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x2000}) 05:05:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x4000}) [ 719.753645] EXT4-fs: 129 callbacks suppressed [ 719.753655] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 719.786294] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 719.786294] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 719.786294] [ 719.826459] EXT4-fs (sda1): re-mounted. Opts: noacl, 05:05:20 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xf5ffffff00000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3026, 0x500001c) 05:05:20 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x7000000}) [ 719.903463] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 719.903463] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 719.903463] [ 719.983125] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 720.043187] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 720.056573] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:05:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x200000000000000}) [ 720.101332] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 720.101332] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 720.101332] 05:05:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x6c000000}) 05:05:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) [ 720.210608] EXT4-fs (sda1): re-mounted. Opts: noacl, [ 720.217030] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:05:20 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x4000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:20 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x700}) 05:05:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x302a, 0x500001c) 05:05:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x4c00000000000000}) 05:05:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xfdffffff}) 05:05:20 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xffffffff00000000}) [ 720.625295] kauditd_printk_skb: 12 callbacks suppressed [ 720.625307] audit: type=1804 audit(1544850320.901:1413): pid=12149 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/991/memory.events" dev="sda1" ino=16561 res=1 05:05:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:21 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) [ 720.846609] audit: type=1804 audit(1544850321.121:1414): pid=12165 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/992/memory.events" dev="sda1" ino=16561 res=1 05:05:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x4800}) 05:05:21 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x1000000000000000}) 05:05:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xffffffff00000000}) [ 720.979294] audit: type=1800 audit(1544850321.251:1415): pid=12145 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor0" name="memory.events" dev="sda1" ino=16578 res=0 05:05:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3023, 0x500001c) 05:05:21 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x400000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) [ 721.116959] audit: type=1804 audit(1544850321.391:1416): pid=12184 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/784/memory.events" dev="sda1" ino=16568 res=1 05:05:21 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x200000}) 05:05:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x74000000}) 05:05:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xffffffffffffffff}) [ 721.281459] audit: type=1804 audit(1544850321.551:1417): pid=12199 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/992/memory.events" dev="sda1" ino=16561 res=1 05:05:21 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x830e, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events2', 0x3000, 0x500001c) 05:05:21 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x2000000000000000}) 05:05:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x10}) 05:05:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xf8f73f0000000000}) 05:05:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events;', 0x3000, 0x500001c) 05:05:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x30b6, 0x500001c) 05:05:22 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x74, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:22 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x80000}) [ 721.832144] audit: type=1804 audit(1544850322.111:1418): pid=12251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/995/memory.events" dev="sda1" ino=16546 res=1 05:05:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x7a000000}) 05:05:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xedc000000000}) 05:05:22 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x10000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:22 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x3}) 05:05:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x1000000000000}) 05:05:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x3}) [ 722.291008] audit: type=1804 audit(1544850322.571:1419): pid=12284 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/995/memory.events" dev="sda1" ino=16546 res=1 05:05:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x300f, 0x500001c) 05:05:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) [ 722.380697] audit: type=1804 audit(1544850322.601:1420): pid=12251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/995/memory.events" dev="sda1" ino=16546 res=1 [ 722.408359] audit: type=1800 audit(1544850322.601:1421): pid=12251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor3" name="memory.events" dev="sda1" ino=16546 res=0 05:05:22 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xc0ed0000}) 05:05:22 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x8cffffff, 0x0, 0x0, 0x820, &(0x7f0000000240)) [ 722.468207] audit: type=1804 audit(1544850322.741:1422): pid=12295 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/996/memory.events" dev="sda1" ino=16532 res=1 05:05:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x1000000000}) 05:05:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x2}) 05:05:23 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x7400, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:23 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x1000000000000}) 05:05:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x6c}) 05:05:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3018, 0x500001c) 05:05:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:23 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x68, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:23 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x300000000000000}) 05:05:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x1000000}) 05:05:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x400000000000000}) 05:05:23 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xfffffff5, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:23 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x3f000000}) 05:05:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x20000000}) 05:05:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x303d, 0x500001c) 05:05:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x300000000000000}) 05:05:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:24 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x68000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:24 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x40000000}) 05:05:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3003, 0x500001c) 05:05:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xc000000000000000}) 05:05:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x700000000000000}) 05:05:24 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x300, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:24 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x10000000000000}) 05:05:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events,', 0x3000, 0x500001c) 05:05:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\'', 0x3000, 0x500001c) 05:05:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x1f00}) 05:05:24 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x1000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xf6ffffff00000000}) 05:05:24 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x10000000}) 05:05:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x200600, 0x500001c) 05:05:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xfffffffd}) 05:05:24 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:24 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x5000000}) 05:05:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x300000000000000}) 05:05:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x304c, 0x500001c) [ 724.760403] EXT4-fs: 158 callbacks suppressed [ 724.760414] EXT4-fs (sda1): Unrecognized mount option "ý" or missing value 05:05:25 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xfffffdfc}) [ 724.839281] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 724.839281] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 724.839281] [ 724.925351] EXT4-fs (sda1): re-mounted. Opts: noacl, [ 724.932873] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 724.932873] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 724.932873] 05:05:25 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x4000000}) [ 724.967894] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 724.981531] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:05:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x302d, 0x500001c) [ 725.017912] EXT4-fs (sda1): Unrecognized mount option "ü" or missing value 05:05:25 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x7400000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) [ 725.074263] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 725.080388] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 725.080388] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 725.080388] [ 725.097620] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 05:05:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x4000000}) 05:05:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3006, 0x500001c) 05:05:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x7}) 05:05:25 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x6000000}) 05:05:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:25 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x2d00000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x48}) 05:05:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x1f00000000000000}) 05:05:25 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xc0}) 05:05:26 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x4000000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x700}) 05:05:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500002d) 05:05:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x7a00000000000000}) [ 725.992414] kauditd_printk_skb: 20 callbacks suppressed [ 725.992426] audit: type=1804 audit(1544850326.271:1443): pid=12569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1003/memory.events" dev="sda1" ino=16528 res=1 [ 726.051950] audit: type=1804 audit(1544850326.331:1444): pid=12540 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1003/memory.events" dev="sda1" ino=16528 res=1 05:05:26 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x4000000000000000}) 05:05:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) [ 726.134068] audit: type=1800 audit(1544850326.331:1445): pid=12540 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor3" name="memory.events" dev="sda1" ino=16528 res=0 [ 726.219575] audit: type=1804 audit(1544850326.361:1446): pid=12570 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/794/memory.events" dev="sda1" ino=16563 res=1 05:05:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x1f00}) 05:05:26 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x100000000000000}) [ 726.349832] audit: type=1804 audit(1544850326.601:1447): pid=12588 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1004/memory.events" dev="sda1" ino=17126 res=1 05:05:26 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xf6ffffff00000000}) [ 726.428375] audit: type=1804 audit(1544850326.701:1448): pid=12594 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/794/memory.events" dev="sda1" ino=16563 res=1 05:05:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000017) 05:05:26 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x4800, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xfffffdfd}) 05:05:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x700000000000000}) [ 726.798652] audit: type=1804 audit(1544850327.071:1449): pid=12617 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1004/memory.events" dev="sda1" ino=17126 res=1 05:05:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:27 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x2d000000}) [ 726.869661] audit: type=1800 audit(1544850327.141:1450): pid=12588 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor3" name="memory.events" dev="sda1" ino=17126 res=0 [ 726.945753] audit: type=1804 audit(1544850327.191:1451): pid=12625 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/795/memory.events" dev="sda1" ino=17135 res=1 [ 727.005284] audit: type=1804 audit(1544850327.261:1452): pid=12632 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1005/memory.events" dev="sda1" ino=16565 res=1 05:05:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x6}) 05:05:27 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x4, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x600000000000000}) 05:05:27 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x8}) 05:05:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500000e) 05:05:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xc0ed0000}) 05:05:27 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x3ff7f8, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x6800000000000000}) 05:05:27 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xf11, 0x4400) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={@local, 0x71, r1}) getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e7f6163320a067d5416e873acccda4a5e6c2c00"]) 05:05:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xf6ffffff00000000}) 05:05:28 executing program 1: getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000080)='\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000100)) gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0), &(0x7f00000002c0)=0xc) gettid() r1 = getpid() getpgrp(r1) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$TCSBRK(r2, 0x5409, 0x7) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000300)=ANY=[@ANYBLOB="6e7361636c2c00a27e918887dbcbd6ef74f742efb08cf4f970b900000000383f65a43c3e1f1647b15e459d9af6bfb883fc41d64d52e2d22e47efda7a8125a9531a17c753898005f48534385acdfad4137bbf22f946e64bbb21a33e3321d7acf054"]) 05:05:28 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x80000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xfcfdffff}) 05:05:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000019) 05:05:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x4000000000000000}) 05:05:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events9', 0x3000, 0x500001c) 05:05:28 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xf6ffffff, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:28 executing program 1: r0 = getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000440)=ANY=[@ANYBLOB="6e6f61636c2c002078f627681408492a7bc73af6c2b4b14af6756dc64c5c64eeb3dd2dfa2cef20509e985743a566173c08b0ce67929b466b96e529369a3beaa4f9723c13da0000000078d897f72727df1e41135c73c2f6103b51c0e153f66a734b3cccabea63d6adbe918e992e81de8cdcd80f1c2dded73a53bc5c2582519f8c30d82503e4d41436894c035feca9f6fe85cc754fcff696ea22074749c981710000004333ffff0700cd861871c3874f1d0000000000000000301d0713217142aedd5e74d10f14cd3118bd9bbc7265ef000000000000000000"]) r1 = open(&(0x7f0000000000)='./file1\x00', 0x20a1c1, 0x40) write$FUSE_LK(r1, &(0x7f0000000080)={0x28, 0x0, 0x7, {{0x5, 0x5, 0x2, r0}}}, 0x28) 05:05:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x7a}) 05:05:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x20000000}) 05:05:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.eventst', 0x3000, 0x500001c) 05:05:28 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x20000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:28 executing program 1: r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x0, 0x8000]) getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x8) mkdir(&(0x7f0000000180)='./file1\x00', 0x42) socket$can_raw(0x1d, 0x3, 0x1) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) socket$bt_bnep(0x1f, 0x3, 0x4) 05:05:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000036) 05:05:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x6c00}) 05:05:29 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r2 = getuid() getresuid(&(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440)) r4 = getuid() fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000500)='./file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_G_STD(r8, 0x80085617, &(0x7f0000000640)) pipe2(&(0x7f0000000740)={0xffffffffffffffff}, 0x80000) ioctl$RTC_ALM_READ(r9, 0x80247008, &(0x7f00000007c0)) renameat2(r9, &(0x7f0000000940)='./file1\x00', r9, &(0x7f0000000680)='./file1\x00', 0x4) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="02000000010000000000000002000200", @ANYRES32=r0, @ANYBLOB="02000400", @ANYRES32=r1, @ANYBLOB="02000500", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32=r3, @ANYBLOB="02000100", @ANYRES32=r4, @ANYBLOB="02000400d107080e9add81c963682453c2c993f488bae57ae030bfb2dc96a4499d528fbcea1c04d478eef0461b7313d6d917839088de131f1f149af11d1ad5d1574520c93ef884cd5fbab4b3d1a400ec3b5a79a3a1c4a8b454da4ecf922bc1c1258341abbbea71d8410e6b7fbca3ad98bd8f42368f00005716914d2a995a623b0c03bd4d3770c4a8c124b9735b7df95468653619e4adcc028985e6dfc8bf78751f827e94476f15314a4bcc015ef8e7ff2abee943b1ff", @ANYRES32=r5, @ANYBLOB="040005000000000008000300", @ANYRES32=r6, @ANYBLOB="08000200", @ANYRES32=r7, @ANYBLOB="10000700000000002000040000000000"], 0x64, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xfffffff6}) 05:05:29 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x7a00, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x3ff800}) 05:05:29 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000000), 0x5008, &(0x7f00000000c0)={[{@noacl='noacl'}]}) 05:05:29 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x6c, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x97ffffff00000000}) 05:05:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x4c000000}) 05:05:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000035) 05:05:29 executing program 1: getpgrp(0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x80, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000002c0)=0x10000, 0x4) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dsp\x00', 0x80, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000240)=""/74) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000500)=@assoc_value, &(0x7f0000000540)=0x8) truncate(&(0x7f0000000100)='./file1\x00', 0x10000) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)=@random={'osx.', '/dev/vga_arbiter\x00'}, &(0x7f00000003c0)='/dev/dsp\x00', 0x9, 0x3) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6f61636c2c001c9c5f660c21d9158cf8aa8700a3f26bfec6437f01000000000000"]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='security.SMACK64EXEC\x00', &(0x7f00000000c0)='noacl', 0x5, 0x0) 05:05:29 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x2000000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xfcfdffff00000000}) 05:05:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x3f00}) [ 729.799859] EXT4-fs: 134 callbacks suppressed [ 729.799869] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 729.799869] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 729.799869] 05:05:30 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x1f00000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) [ 729.893407] EXT4-fs (sda1): re-mounted. Opts: noacl, 05:05:30 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) inotify_init1(0x80800) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000026) [ 729.950029] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 729.950029] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 729.950029] [ 729.973339] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 729.984785] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 730.010344] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 730.053268] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 730.053268] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 730.053268] 05:05:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x7a00}) [ 730.094323] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 730.110605] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 730.120195] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:05:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x6c}) 05:05:30 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x600, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:30 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2, 0x0) bind$bt_rfcomm(r0, &(0x7f0000000080)={0x1f, {0x72d, 0x5, 0x7, 0x0, 0x1f, 0x3ff}, 0x2}, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x4c}) 05:05:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000038) 05:05:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.eventsL', 0x3000, 0x500001c) 05:05:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xfcfdffff00000000}) 05:05:30 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:30 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB='cl,\x00\x00\x00\x00']) ioctl$VIDIOC_EXPBUF(0xffffffffffffff9c, 0xc0405610, &(0x7f0000000080)={0x6, 0x7000, 0x18, 0x80000, 0xffffffffffffff9c}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x80001, 0x0) r1 = accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f00000002c0), &(0x7f00000001c0)=0x60, 0x800) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000000)) 05:05:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xffffffff00000000}) 05:05:31 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x3ff800, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500002f) 05:05:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xfdffffff00000000}) 05:05:31 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f61636c455e95407c92f813142c00"]) [ 731.172895] kauditd_printk_skb: 29 callbacks suppressed [ 731.172908] audit: type=1804 audit(1544850331.451:1482): pid=12917 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/802/memory.events" dev="sda1" ino=17131 res=1 05:05:31 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x500000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x4000000}) [ 731.367628] audit: type=1804 audit(1544850331.641:1483): pid=12930 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1013/memory.events" dev="sda1" ino=17149 res=1 05:05:31 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000300)='./file1\x00', 0xa2) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x8cffffff00000000}) 05:05:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xf5ffffff00000000}) 05:05:31 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x7000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) [ 731.575624] audit: type=1804 audit(1544850331.851:1484): pid=12947 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/802/memory.events" dev="sda1" ino=17131 res=1 05:05:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000022) [ 731.699782] audit: type=1804 audit(1544850331.981:1485): pid=12947 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/802/memory.events" dev="sda1" ino=17131 res=1 05:05:32 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000000)='./file1\x00', 0x0, 0x1) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 731.765621] audit: type=1804 audit(1544850332.011:1486): pid=12955 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1014/memory.events" dev="sda1" ino=16564 res=1 [ 731.885691] audit: type=1804 audit(1544850332.111:1487): pid=12966 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/803/memory.events" dev="sda1" ino=17131 res=1 05:05:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x97ffffff}) 05:05:32 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x3, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xfdfdffff00000000}) 05:05:32 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) flock(r1, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x2000, 0x18) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000080)={0x1, r2}) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB='n\bacl,\x00']) [ 732.162492] audit: type=1804 audit(1544850332.441:1488): pid=12983 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1014/memory.events" dev="sda1" ino=16564 res=1 05:05:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) [ 732.314473] audit: type=1804 audit(1544850332.591:1489): pid=12999 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/803/memory.events" dev="sda1" ino=17131 res=1 05:05:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500002b) 05:05:32 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xf5ffffff, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x4800000000000000}) [ 732.419235] audit: type=1804 audit(1544850332.631:1490): pid=13001 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1015/memory.events" dev="sda1" ino=17149 res=1 [ 732.517395] audit: type=1804 audit(1544850332.791:1491): pid=13008 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/804/memory.events" dev="sda1" ino=17128 res=1 05:05:32 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000000)=ANY=[@ANYBLOB="606f41df61636c2c00"]) 05:05:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x40000000}) 05:05:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x10000000000000}) 05:05:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:33 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x6800, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:33 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB="6e6ff00fa76d59"]) 05:05:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x4000}) 05:05:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x74000000}) 05:05:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000013) 05:05:33 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x2, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x40000000}) 05:05:33 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f00000001c0)='./file1\x00', 0x102) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x15, 0x202200) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000340)=0xc40, 0x4) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000002c0)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x70240, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000080)=""/102, &(0x7f0000000100)=0x66) 05:05:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xffffff8c}) 05:05:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xffffff97}) 05:05:33 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x3f000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:34 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000440)) syz_open_dev$vcsn(&(0x7f0000000500)='/dev/vcs#\x00', 0x5, 0x8000) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rfkill\x00', 0x6800, 0x0) r1 = accept(r0, &(0x7f0000000480)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x880) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f0000000400)={0x3, [0x0, 0x0, 0x0]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@remote, @in6=@local}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000140)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', r2}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, &(0x7f00000001c0), 0x800, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xc0ed0000}) 05:05:34 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xf83f00, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500000f) 05:05:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x4}) 05:05:34 executing program 1: getpgrp(0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40000) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xdfbc, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)=0x80000000, 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x4000000000) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x97ffffff00000000}) 05:05:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:34 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xf8f73f00, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x4c00000000000000}) 05:05:34 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) mbind(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x8003, &(0x7f00000001c0)=0x7, 0x9, 0x2) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x8, @loopback, 0x1dcc}, r1}}, 0x30) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f00000002c0)={0x0, 0x0, {0x3, 0xe07, 0x300d, 0x3, 0x6, 0x6}}) 05:05:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x7a00000000000000}) 05:05:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000039) 05:05:34 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x1f00, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xf8f73f00}) 05:05:34 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x2000, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000180)=0x80000000000001, 0x80) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0xa95, 0x4) sendmmsg(r0, &(0x7f00000010c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000002c0)='G', 0x1}], 0x1}}], 0x1, 0x40400d4) mkdir(&(0x7f0000000080)='./file1\x00', 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x830e000000000000}) 05:05:35 executing program 1: r0 = getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000080)=0x1, 0x4) ptrace(0x11, r0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 734.818434] EXT4-fs: 123 callbacks suppressed [ 734.818444] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 734.872809] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:05:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events0', 0x3000, 0x500001c) 05:05:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x500}) 05:05:35 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x4800000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) [ 734.947910] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 734.947910] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 734.947910] [ 735.016659] EXT4-fs (sda1): re-mounted. Opts: noacl, 05:05:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)="6d656d6f72792e6576656e74731c", 0x3000, 0x500001c) [ 735.038846] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 735.038846] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 735.038846] 05:05:35 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000080)=ANY=[@ANYBLOB="990a71b5e369353487da8856e0684da7362daeafb72c031267073f7ac028add02c165df5f73f467f9984f184053a5fcf2bedae985afbf4483b751e662592728ad759d25bf508f48e1147f6de6ce6969ff7d9f0d6b0"]) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x850000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0xf0, r1, 0x200, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffff00000001}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x20}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x800}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffbff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffff9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffffffffffed}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}}, {0x14, 0x2, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1b}}}}}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x20000811}, 0x8000) [ 735.094183] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 05:05:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000016) [ 735.135629] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 735.168079] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:05:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) [ 735.189890] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 735.189890] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 735.189890] [ 735.212732] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 05:05:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x1000000000000000}) 05:05:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xedc0}) 05:05:35 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x7a00000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:35 executing program 1: getpgrp(0x0) timerfd_create(0x3, 0x80800) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x200000000000000}) 05:05:36 executing program 1: getpgrp(0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000002c0)={0x8, 0x401}) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='jffs2\x00', 0x1000, &(0x7f0000000100)='\x00') setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f00000001c0)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:36 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x7, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x500}) 05:05:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001e) 05:05:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xc000}) 05:05:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:36 executing program 1: getpgrp(0x0) pipe2(&(0x7f0000000740), 0x80000) syz_open_dev$midi(&(0x7f0000000780)='/dev/midi#\x00', 0x5a8c, 0x8002) socket$inet6(0xa, 0x80007, 0x80) syz_open_dev$adsp(&(0x7f00000007c0)='/dev/adsp#\x00', 0xe9, 0x210000) syz_open_dev$midi(&(0x7f0000000800)='/dev/midi#\x00', 0x4, 0x2) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x800) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/hwrng\x00', 0x2000, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000840)=0x6, 0xfffffffffffffe31) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x400000) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000080)={0x8, 0x1, 0x3, 0x4}) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:36 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x6800000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x2000000000000000}) 05:05:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x2000}) 05:05:36 executing program 1: getpgrp(0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x200000, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x6, 0xa0200) r1 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000300)=0x9, 0x65c271314deb1b80) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)=0x0) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000580)=0x0, &(0x7f00000005c0), &(0x7f0000000600)) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x5}, [{0x2, 0xd457d47280ef4dbb, r2}, {0x2, 0x1, r3}, {0x2, 0x4, r4}], {0x4, 0x60fffe9afc4dc4f5}, [{0x8, 0x0, r5}, {0x8, 0x1, r6}], {0x10, 0x2}, {0x20, 0x2}}, 0x4c, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:36 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x7a000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000027) [ 736.322842] kauditd_printk_skb: 26 callbacks suppressed [ 736.322855] audit: type=1804 audit(1544850336.601:1518): pid=13304 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/809/memory.events" dev="sda1" ino=17157 res=1 05:05:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xedc000000000}) 05:05:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x68}) [ 736.492766] audit: type=1804 audit(1544850336.771:1519): pid=13311 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/810/memory.events" dev="sda1" ino=16565 res=1 [ 736.559338] audit: type=1804 audit(1544850336.821:1520): pid=13318 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1022/memory.events" dev="sda1" ino=17168 res=1 05:05:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:36 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xe83, 0x0, 0x0, 0x820, &(0x7f0000000240)) [ 736.653039] audit: type=1804 audit(1544850336.901:1521): pid=13278 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1022/memory.events" dev="sda1" ino=17168 res=1 05:05:37 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@v2={0x7, 0x1, 0xc, 0x0, 0x58, "a9d4ae756e9cd2a20523029b0d363496eb6ec55378bbd02d7cb0b2cafeaa3db461a57aad727cb10c0e0bb68dbf673f6c73dea215cfcb1f6fe117f25fd2967497c4a687438791fe88926d8893695c38f8dbf20ad329732159"}, 0x62, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000003c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, r1, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x20}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000800}, 0x4000004) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000400)={{0x3, 0x0, 0x180000000}, 'syz1\x00', 0x19}) [ 736.819910] audit: type=1804 audit(1544850337.101:1522): pid=13331 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1023/memory.events" dev="sda1" ino=17175 res=1 05:05:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x3}) [ 736.924969] audit: type=1804 audit(1544850337.131:1523): pid=13340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/810/memory.events" dev="sda1" ino=16565 res=1 05:05:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000033) 05:05:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x1f000000}) 05:05:37 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x40000, 0x0, 0x0, 0x820, &(0x7f0000000240)) [ 737.064647] audit: type=1804 audit(1544850337.341:1524): pid=13348 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/811/memory.events" dev="sda1" ino=16564 res=1 [ 737.166292] audit: type=1804 audit(1544850337.371:1525): pid=13352 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1023/memory.events" dev="sda1" ino=17175 res=1 05:05:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:37 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4940, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000080)=""/166) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB='noacd,\x00']) 05:05:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x6000000}) [ 737.308100] audit: type=1804 audit(1544850337.581:1526): pid=13364 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1024/memory.events" dev="sda1" ino=17173 res=1 05:05:37 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x5000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x6800}) [ 737.417354] audit: type=1804 audit(1544850337.691:1527): pid=13372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/811/memory.events" dev="sda1" ino=16564 res=1 05:05:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000032) 05:05:37 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x0, @time, 0x4, {0x200, 0x2}, 0x7, 0x2, 0x4}) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x6800000000000000}) 05:05:37 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x6c00, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x600}) 05:05:38 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x704a, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\v', 0x3000, 0x500001c) 05:05:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x600000000000000}) 05:05:38 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x6, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)="6d656d6f72792e6576656e7473ff", 0x3000, 0x500001c) 05:05:38 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x4000000000000000) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB='noaal,\x00']) 05:05:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000014) 05:05:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x7a00}) 05:05:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x10}) 05:05:38 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x1f000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:38 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) getpgrp(r0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x6c00}) 05:05:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xfffffff6}) 05:05:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000012) 05:05:38 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x6c000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:39 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)=0x2, 0xffffffffffffffe2) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@empty, @empty, 0x1, 0x6, [@local, @empty, @loopback, @local, @remote, @local]}, 0x28) 05:05:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events5', 0x3000, 0x500001c) 05:05:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x4c}) 05:05:39 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xc000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x48000000}) 05:05:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\b', 0x3000, 0x500001c) 05:05:39 executing program 1: r0 = getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)="5654d19c4805068fd5363ec07aeed2d85febfb93d35ea17a75be015386c683ab6a92b4b8129404287745bf0ea685bd5fad82183ec6f530946e89", 0x3a}, {&(0x7f00000000c0)="2c8a1b6ef7a76f65a86b9a759cade47166ae87567e2a0f925ada7d8d300b54e710363d428655c44e6180de551f464e66fcf1686da8615b2ecfefac282121e883540ad105bde769a8ed314a934d54c708ddd350c55dcf5fa694e8a4da04538585e2c771851dc8", 0x66}, {&(0x7f00000001c0)="166edc626206b6b1a1567466572f6555cb933782", 0x14}], 0x3) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6fd3af5d1014589786239d400cc99633e2300c3874636c2c00"]) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f00000007c0)=0xe8) lstat(&(0x7f0000000800)='./file1\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000940)=0x0, &(0x7f0000000980)=0x0, &(0x7f00000009c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000a00)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000b00)=0xe8) getresgid(&(0x7f0000000b40), &(0x7f0000000b80)=0x0, &(0x7f0000000bc0)) stat(&(0x7f0000000c00)='./file1\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)=0x0) sendmsg$unix(r1, &(0x7f0000000ec0)={&(0x7f0000000300)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000380)="1c74d954c7a29339b4c0784c8bc1bceaaa2b92", 0x13}, {&(0x7f00000003c0)="bf98441353e8f5edaa580021e86671cdb015aa576d244d7f8c2c1778ce65c90d1ae3e3a114239c9591af5c0a69f4a776f75a71d0ae21da9bbdd72a83fe10d377163ac9b86c3ec4d2c5f62e6279f31e4e2eba6d34ddca97560fe55a752bb96b377c", 0x61}, {&(0x7f0000000440)="7063ad8cc62a1b2115a2792a01c7dcdc20c539a08195e5c5537f669051e08abb502a72bc40168b742db37a9e4c899ea3913e0f0356d78a83f8d2b87ddb248a2bb1b0f1156f260a912cd3ba92deabefa1e4cd85643305236339c0c592ac164000b33147ec87e110c0cbc306b2e0f9c4d82999bbdf43476a7c15bf83dca5625426334d812619ea7a14f517af6859faca2b42cd89d3b0f3504f2d7c1919aef5f3721d7b3872c610ea3be911222e8dc1a428", 0xb0}, {&(0x7f0000000500)="225220cc44ea17e58756ab2f904b282a8dd659563e471e32253f2b4590261e77ec0a7d452a400dff4ebd2f3f54ff37e5e953de9597043d76369a37ee2971385f87302c", 0x43}], 0x4, &(0x7f0000000d80)=[@cred={0x20, 0x1, 0x2, r0, r2, r3}, @cred={0x20, 0x1, 0x2, r0, r5, r6}, @cred={0x20, 0x1, 0x2, r0, r7, r9}, @rights={0x20, 0x1, 0x1, [r1, r1, r1]}, @cred={0x20, 0x1, 0x2, r0, r11, r12}, @cred={0x20, 0x1, 0x2, r0, r13, r14}, @rights={0x18, 0x1, 0x1, [r1, r1]}, @rights={0x18, 0x1, 0x1, [r1]}, @rights={0x18, 0x1, 0x1, [r1, r1]}], 0x108, 0x20000000}, 0x8001) ioctl$TUNSETGROUP(r1, 0x400454ce, r8) sendmsg$nl_xfrm(r1, &(0x7f0000001280)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001240)={&(0x7f0000000f40)=@newpolicy={0x2fc, 0x13, 0x810, 0x70bd2a, 0x25dfdbfc, {{@in=@multicast2, @in6=@dev={0xfe, 0x80, [], 0x1f}, 0x4e21, 0x2, 0x4e23, 0x3, 0xa, 0x80, 0x80, 0xff, r4, r7}, {0xffffffff, 0x6, 0x89, 0x376e, 0xd7, 0x7, 0x8000, 0xf3f0}, {0x3ff, 0x7, 0x1, 0x6}, 0x6c, 0x0, 0x132778f6182ff3c8, 0x1}, [@mark={0xc, 0x15, {0x35075a, 0x8}}, @mark={0xc, 0x15, {0x35075c, 0x30c92489}}, @algo_aead={0x80, 0x12, {{'aegis256-aesni\x00'}, 0x190, 0x180, "d9febfb2bf39f43951262cf7740723315489782aab7538083eaed8a6b85a6c98c216c38651ea904be036505e7fa6d73091db"}}, @srcaddr={0x14, 0xd, @in6=@local}, @policy={0xac, 0x7, {{@in6=@mcast1, @in=@local, 0x4e24, 0x6, 0x4e21, 0x0, 0x2, 0x80, 0xa0, 0x2c, r10, r13}, {0x2, 0x4, 0x1374, 0x7, 0x2, 0x80000000, 0x9, 0x9}, {0xffff, 0x1ff, 0x2, 0x5}, 0x0, 0x6e6bbe, 0x1, 0x1, 0x0, 0x2}}, @migrate={0xe0, 0x11, [{@in6=@remote, @in=@broadcast, 0x32, 0x0, 0x0, 0x3504, 0xa, 0xa}, {@in6=@remote, @in=@rand_addr=0x80000000, 0x7f, 0x3, 0x0, 0x3505, 0xa, 0x2}, {@in=@rand_addr=0x5, @in6=@local, 0x3c, 0x3, 0x0, 0x3501, 0xa, 0xa}, {@in6=@dev={0xfe, 0x80, [], 0x14}, @in=@remote, 0x3e, 0x4, 0x0, 0x3503, 0xa, 0xa}, {@in=@multicast1, @in6=@local, 0xff, 0x3, 0x0, 0x3507, 0xa, 0xa}]}, @mark={0xc, 0x15, {0x35075c, 0x1}}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x800}, 0x40080) tee(r1, r1, 0x2, 0xa) 05:05:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000024) 05:05:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xfffffdfc}) 05:05:39 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x100000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xfffffff5}) 05:05:39 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) r0 = syz_open_pts(0xffffffffffffff9c, 0x400080) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000000)={0x3ff, 0x800, 0xa347}) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x8cffffff}) 05:05:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:40 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x830e000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:40 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x822, &(0x7f0000000440)={[{@data_ordered='data=ordered'}], [{@uid_eq={'uid', 0x3d, r0}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', r0}}, {@smackfsdef={'smackfsdef', 0x3d, 'system\'em1'}}]}) 05:05:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x3f000000}) [ 739.884384] EXT4-fs: 135 callbacks suppressed [ 739.884433] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 739.923714] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 05:05:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500002c) [ 739.923714] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 739.923714] [ 739.960086] EXT4-fs (sda1): Unrecognized mount option "ÿ" or missing value [ 740.023025] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 740.029293] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 740.039072] EXT4-fs (sda1): Unrecognized mount option "uid=00000000000000000000" or missing value [ 740.079266] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 740.085934] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 740.085934] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 740.085934] 05:05:40 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0), 0x4) r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x80000000, 0x10000) sendto$unix(r0, &(0x7f0000000280)="34f09d4a308f201479cb3a70d84ca236441fd0aae98401abe954c38e12f238d50398d2dca83581caeb63bfae6d68e33fd954ada83ea0e0b81c729e48aa40cb720f045b69e62b40c281271c6e5f2b6aad628bd8e71055de9918bd49edcc9ef4932ba50f5dee434216f8fd448a66151c526ba0fe00d4f48609eefc6c67ccc22a880c2fc2dcfef0dd0888a81e4d70", 0x8d, 0x8010, &(0x7f0000000340)=@abs={0x1, 0x0, 0x4e21}, 0x6e) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x4, 0x29879c55, 0x9, 0x9}]}) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:40 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x6000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) [ 740.129552] EXT4-fs (sda1): Unrecognized mount option "ÿ" or missing value [ 740.192337] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:05:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xfdffffff}) 05:05:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xfdffffff00000000}) 05:05:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:40 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x4}, 0x8) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2869c0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000002c0)=0x848) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x1) 05:05:40 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xfdfdffff, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001d) 05:05:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xf83f0000000000}) 05:05:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x3f000000}) 05:05:41 executing program 1: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) getpgrp(r0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00']) 05:05:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x700}) 05:05:41 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xf83f0000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:41 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x4800}) 05:05:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xfffffdfd}) 05:05:41 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001b) 05:05:41 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xfff, 0x400000) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f0000000080)={0x3, 0x0, [{}, {}, {}]}) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x830e000000000000}) 05:05:41 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x10000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x74}) [ 741.516476] kauditd_printk_skb: 31 callbacks suppressed [ 741.516488] audit: type=1804 audit(1544850341.791:1559): pid=13684 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1033/memory.events" dev="sda1" ino=16738 res=1 05:05:41 executing program 1: getpgrp(0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)="6d656d6f72792e6576656e7473ff", 0x3000, 0x500001c) 05:05:41 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x3000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x7400}) 05:05:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) [ 741.741814] audit: type=1804 audit(1544850342.021:1560): pid=13703 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/818/memory.events" dev="sda1" ino=16625 res=1 05:05:42 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) getpgrp(r0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500003c) 05:05:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x6}) [ 741.882197] audit: type=1804 audit(1544850342.161:1561): pid=13709 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1035/memory.events" dev="sda1" ino=16641 res=1 [ 741.992189] audit: type=1804 audit(1544850342.191:1562): pid=13713 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/819/memory.events" dev="sda1" ino=16525 res=1 05:05:42 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x1000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xe83}) 05:05:42 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:dhcpd_state_t:s0\x00', 0x23, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x7}) 05:05:42 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xffffffff00000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) [ 742.358060] audit: type=1804 audit(1544850342.631:1563): pid=13743 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1035/memory.events" dev="sda1" ino=16641 res=1 05:05:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) [ 742.432173] audit: type=1804 audit(1544850342.711:1564): pid=13748 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/819/memory.events" dev="sda1" ino=16525 res=1 05:05:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x80000}) 05:05:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000011) 05:05:42 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x20, 0x20000000041) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000100)={0x17, 0x75, &(0x7f0000000080)="ba5e9475e49ba38876a4f918e85a7eeaee7722c37dab13c6c40070f22438afae7e83cc3f32ef4da57f259ba9ecffd44a60f836bb2072af4d3afafe19eb7d064a5ac42bc235ac3807df1d5c87ad055b03c660310d5d0bad1f11f2c91554e071f3e074768551a3d8d860a3934a59314e1f403092a754"}) connect$l2tp(r0, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}, 0x3, 0x3, 0x2, 0x2}}, 0x26) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 742.525187] audit: type=1804 audit(1544850342.731:1565): pid=13709 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1035/memory.events" dev="sda1" ino=16641 res=1 [ 742.584662] audit: type=1800 audit(1544850342.741:1566): pid=13709 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor3" name="memory.events" dev="sda1" ino=16641 res=0 [ 742.627026] audit: type=1804 audit(1544850342.901:1567): pid=13759 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/820/memory.events" dev="sda1" ino=16625 res=1 [ 742.691839] audit: type=1804 audit(1544850342.901:1568): pid=13757 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1036/memory.events" dev="sda1" ino=16570 res=1 05:05:43 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x48000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x2000000}) 05:05:43 executing program 1: getpgrp(0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x4, 0x210200) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x101) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)=0x9, 0xffffffffffffffd2) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x20000000000000}) 05:05:43 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x100000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000034) 05:05:43 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001440)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0x3, 0x3, &(0x7f00000013c0)=[{&(0x7f00000002c0)="3b2ee157c274548d3e15e94b12c798f4f6fc13351b154a45f6c73f1f0f817e1679b174a8f297d08b1b8bb2ee16d654e6cca8146c71e1cd343c848760d37055244cb0628534cb2c5cf28059e9cc2b1a712556b91e1660e40d07f2508572eadbc91d7652ea263dd09a96e618a77a647323adae4e5f15491ce00293bd294408d3bd0343cdaa18ed4bde1d3623ccc4d29231123dc3bdaa609ef5197fd8bacc7ed002638302ab6b3d7fe0e64ac5bcf6912e47bd8569cfcdaf18146330e9613e996f8f303dc270ecd2be261806f9951ce2f744d37e8f1137e937290ba48a2d4861739f7e05fc6ed10347", 0xe7, 0x3}, {&(0x7f00000000c0)="e96d3d3e1c73608403bf3fc1489bd39b58158c2dc466555d497ac76eb6bd215e0207525ab29e322301c32b5195565380174a7a084235779f73ee22f1050fab3c269b4fa5e94a98c35d61bd11228fc1871d", 0x51}, {&(0x7f00000003c0)="754218d7270fd677696d0da72e4c74aceef0da9d9320aecc9b0d955d05679c992d2340f73ff505988584b61c4b9c4b1f738bbb099565e175638c0e2bb499b9da75df16afcbc50961645b6a099ed070781f583b29e443ddb69ba786f2aeb79e1ed72346bc58b11b6f121a5b95d222ec9bd02735bc3a2647ba2f4591536a5c3448e6d1b326ffe112da5a0872b929fae0dc76aa19a66e85324ef6aee0bd48c4bff92406c80d92307329ee21270925bb6216404eaa2780dc238099ba7e9b64949d44016565c773224c0f4bedf33c893927fe83694295ed3747ab419f75a7def6097bed7172a3b7c46b999048b31c8d27a164649b050ff09e491d950c7a0af93e8ee8bf8d9f52939154a54c43e2388ab0ebadcdfd4b2818d9f53b5ea49beffff1c0c8392c05c3e9a5e846c1920aa893207de7de23eb7f174f7784aefe352bc43d331baa8f166df8ac3b365b2f352397257a870eb1639e0f9e355e86b10ccd8fd39b9dd511d89512b06ff828c1fe3f11c418822cdf159742ca9bf6392f91ad7ff95fbc36660e4e63b58bbadddcf3e0b280a65129e965705043eae6975e4b3f6341e82cba94e03d723257c58009eba47bf2255def3e85a1c85eaf442b52a52ab590f9e2f626986fe4776e52c85740e76a3143b55864964e29b2bbbb9f7b2bb5ad760ce6259c6f3c2a091a3ef0141e04b815df41a5f816fcd10026df380f4eaf8b5e2be86940f8af7218f0338ad24b967d5ac391a7ff4fe7ed662cadbbd971a69ee00d3527946c02e53a38f742b0ff4e8e3114c18c657d9b1a3c2600903c9a4dde0ac0f0d60115f18ec28c9e1ffda31f755d01917d68a139fdb93359045efcbcacbef5f0ca26898aaee6159fcb94583b1a03808a8dafaf6cb6c07d0a05bd1f03a6ad5d45a66cd6558d4762207bef4cdc49cb18d348f170a3b4452aee46ec07a7796c5b1b303f99303659a54f420167ea0fd4ba0784f6bdc5814fe9f36d06fc9a5b1910fc8035fadd52e3cec15f87e7774ca22cc9092ce3d3962b319d9759aaab439f792a870c8b96303c8c16c3113555b08d5283903e42ddc15d5811ecd0d166c9780f04476d05a82d442a14015f18736bed746b361368798c969989ed096eaf2a1a9ec4f70dc7c20a3976789bae15fbe0c6de919e6a29593a2de57997b758dd4498ad0133fe09355f85d6b64844582774806e248cdb10068fd8df21aa99079d5d0446c11f1dbb34cb525f809de696876d986cc3ed164fa164a32174436784582cdacbb9b7937299119e073e9c0f66b22423953c6992ebeea405cb101fb11a111a7de6c3635e5e684ff07b851e7c0f9fcdf4f469cd94dea9ce6cb82c014ecff6bdab728f195d8ccf75f04711b56b460d5f739c3cdb96cd3ca7eeda07f1f1356771ac5e6330177a468822e50f7a8a395d2ceaf0a213ec7ddbda1a2323740f51999799ba0d17717cb5101922d81ad8744c58eed5fe42cd0ece06dc895667a689ce0465cf6b91ce834cf0fae961e12ef0d8e06ed0f7298d5cf174c5f515f4c664c371ecac042e0ea65463546bd58eb5bc11f324d952fa49fbda3685650fc597f4e4859f68d865848b831e800b6af4f53085f72196eec06e05a99bf7ff1a590e8d35687bcd94575a1834dc9d9b642442b61289419c581f342e8cd6379e987a375c45bde4136b3d7f837ab131a3eb0ec3d0906f1c0f632c04985c22834980e41b38bc5dc3e4be90571f8c8fe40b84c05a8ae9fa3d35ff3ec9c94290f2fb4dcfd46fedbbbcb942a9b2eb5a840a0f55f73dce7e328980a654a0bb2f8bb2102cfb8232b3ca870520e2ad1db3357f696525dcf9616e51a03e04d436fe04f90c90df1672d06569ea56343dab61b1d59ee9de4e1ed670312ed99774a21a78229880bb8bd934785a985803b4248c2e00dbb827291c1450c36f3c4370ec68b1bb6558a65f1b8589022821c0fff2291f619a666fde0a60d2fa0a9eebcdfd181ab709f97362a45ba096e68dfb88310fe311709bc86f096dfb470c6cfe81b45362c116321b7d20faaa3743d056286a8e12aceee6dcd35ed1c52c09a0474e85135291524d8415602e94b5dd2e80e73863ae8103e7677ba3a654c986d2d4dff98330b1584eeb44b2b6c4c6f7ec93b162dbe09831985d3586931050f823d494a0905f501b2e06124fe8fc194ce305b3080b1f07382fa80b21ffa7bef1d3b5c056ec1fedab6ab4f4d3b70ce0e1ba9c90a4acef4c0bc1fb2623d14401a6c6ec017a524f8cdc8fda13b68f83cf945ef112bb2a3c5d31130bf5e9051e68fdac458090fea7512450c779c3b3ad0ad186adbf25fc81d49480311bac74745e016befcecef805a8b8010cf8ad0fc5a2659c6d6f19ee130319eb27643b85c9708d0f1b587aa5d4d82764622d327a5aa74b3a7aa5d517a7ce97a4e7d88e141f848a3d1a5202a11477bcb47dd1b7e4702d046e24d3d1a3935efb4743b59b584f2aa39e9c8691d35aae9b5cf5f4b00b21225ddd2ced14d521cb157d91a2573bf8601e1621c13d38137e30accfba7b447824bc36a2580f52c1033b29f1d7a2be040b7c79e79d0f2a8e69881c4be1c77fc28c7d812ad44de5d02a716cc53eddcdf542e01f8365d2349fea9ada966b13de8efd444f78d85cff5d5ee1d4cca892e8190375e9ffad4147dd4d8a2d963da8b38c2489df596234c57d11b7492dc0da31044e49d55be4be2af68e647496a4eb11dd5eb535a89a2f80cda39296502bcf1e41f37cfc110f8a9211ab83d5760199b3e062c991c43fe5a8a6b0914f8d7e41833ecae48eab670d86d20d263e04035e171647a64a3d0c7b2203aede2b92883189de7bccf03b22ebec5b9d576faae8103bee35b89f26cd9574e5cb4964ccfe62ab522e8e5c5fe140769637fe31fab29c01733c31743f8c4f50e501650d7f2e8b417081c40484276b62e31451c03f52053774e23afd602000beac9250ef97ee871c49495e526124587e9629795db077f5a193ec2f73d1e541b3cdd083f7101dff242f872019e41968bc4f788de8e61c918e0166e67b9c07b9604e157d3339b73d50727ef83ea0b04f53b2297c6c3d0078e611e609e666ff90ad77014f609aba7530138424a13723ed7e0caa326ca906ba52edd5526e0fcc3ac7ef43bf8fca6006b71cdd0f0e11543d8cfaca0058c85131ef8e0f50914dd1648f5b678d585ab077d27617b396180c0581cbbbb0eb234098f62c43173a5f5511feef74887fd4e56ed9ac7c45d3f7a1736a4d0d2fab91fe78bd539d69090234f8e8442edce60989c6bc86fd794bc7422e63c8a1b5e3de3713fc6f74f0e9d756caffc0df5c9475daab55621780d683f2f45b6c48ee45e448faa93ea6278b3f76f9794aaba70bff07b3ed02b20351340e1e5432fd7c53b18b617749ebbdc271f46b2ac08ba27fbf89db969a7edfce18ac3247cad632c814013700ddefff2312ee95207e249541ab1ace6d29f2058c4c3934309811dce6cbad99042d57d49d7a94224added7fff153beed35562bf521b501317147a7155cc731493dca5bd6971451abb9eb1142d19a382363ed8e5ab760cfc5a1dbfdb24fc46c255312b4d5c30488cd3245d510016f35ed9eaa8402849eae722a9734aff806d994e3b750d0913dc491a1ade5dbd29d382b787372b147010bbcbf66b6ce1e967a1dd042d47b75842643112a6cc486c10c1f2773b642c0cc242269c174f067d85169a8b1ab6a7a41966da26b5adbb4447f44cd7cc03866c80ec90b148dda2be9c09262a332743dd845f0355970bfc823ccdd1f90def42e9dd564e3e114ce1d2c5c04f78d57c40ee196aded91ac6cab69c1d80493c4160476b6c2c49f88146b8a0bc62595865d6728dec01011c09ec03cbd2c88c4e71b8b6e25071c36bd6651ca7caf03a3cde5b5ad4b1622d92adaa0d0ac48611d4e35e19c199cce51a1e512e9189941c47be4cab07b9735c6d2076de7276d5da55cd847f1ec7987e57c9fb06d1454baf3d164ff584b1d7656903145f8725b52c4b841e5e516943e51b36260e5ac310c6d8c979e6d49f163284c4c691613a17f5b7c360c35dc32fecc291f0890506ed358e75c4821dc0329b259723eceb5fc216d0eeae481883b3e755613eb9bd0447ea40d605ba656931be8d2ee62b84589023a37fee850be827a50b7bea3495383c45eaf7c798b4dc162d9ba6c2bc7d1a2267f9abff32e274d627c860aa13b0455b2670c781d640e5b6d8f104814d6b8ebe145da99ae591e11ffe7d6fba7864421bb44a11e2ad210d10fd65ea96eef73e656e190af6078c1c7b39605ac1ab440aa17611f7f64cafe118f17a5bc96cfcfeb38622d40a85df3752853853ec247776a32daef34718a168a486fd57df37f5a49aae6e8f31a0099cc652d6bed088731b015be9b4f664780c07f5f94950c9919102e8ac844085e32fbcd60ea8c00c54b76b434213f4a84f30e88c3dc3a7e3e7def19576b7bfae6a406aa6e5241790863a9b3823da018a91339e9245138a123b748b7f165546157630609d2b6f184ecc625cbd6b5bd730ea3cfbce7154e8faf587b078aa160389dbdb792e7ca12348d217a63d1da0501999bc9b8cd483a4f207fd1d282af63402c3d096ffb593c21d5792b8f23ba0871f449537b70a7af1f745353c29a48cfabf03704c224947bc5baf46b63aea59f80f726bf695ff2b105ec9c453ddb7723e61b9db2b1173c0146a285f580becf9479772e0386e8e2456b7f64002f29f67a92a69132c0f5c62738602e5dfd68ccae906516bc958ff81cbda4cf92dd53e47cdb7fe45f121134a78e25325ad4aa6f82f473f578b29f7848732832a91c110c793126fe8ae405638c97828338e2eacc5ad446041a5d3a9fa839fb63b67e6bd423952f3d518bac96b21e5d64c3b6448903c1ab58d62e461f2007988e4581381cc1f35f41a29bd5f61dded00e3bd3fee6e9821490d769ec5a08d0fa7952e762bcce9699c4da4f1ed133d62f64fe85dff30b1996cf58e242e9cbf4776e7b55c71292692086c3a4332f4ae8730827b26216b24af9c199ee7c80c033a76d2aeb0e6ea8cdb844892bef6aa3ec1a325ebc3a539497f4770b41c15f40e80f8e673b6b586ded97991dfb6de499dbafa11f44c038114cb377a1191faf2516bc56754f8e183d27622cca52ab2c12c10e4ee6f3ecd35947c9817376c7dddb775e006accf1fb17d0e7f92dcc47de3a8ffa927573fb458e0357b146eab97366fbf1dc3e1fdbdde65b6e026947c927982f7bbb797509bb3a7b15ffacb12041934b276d834e7e889161f497163708d22ff5430f3289a2775746f65dca766810744c5ccf17933f7ae1d0261b3b45bc2dd31134a43ce51512d567a9c3bdfe904782679d682cefeb3454627cacc93ba9346ea8ba9d2a521b8495a11cf033aab971aeea40fe1fa263d24f5008a15471b88eb54d6511c10cc50370325981fd567429b9d45bfc14d15bada3c0d4fdd6f6aafd7116512b1d8af563ca6236eb148e931cf41e2f0363b99d9fe41173b849c5bd8b64e01b27ca23f52da9344e11962a555c31ff5d438cc27b10c974d58c328aa2d9147dfd4391298c86649f0efb8006be8d39a9e3fac19f6a75d824948a724ca0e0bbd71a5fd996ec7a7e4b722aa7f93fd5d53cff1e88dd598686ba6f7511cde5d7cfb88d82422dbdf17d05576d59b5af51454827ec1b43962ba88e457141cfd9f4b806cf85a2025f9a4f27e4407875d55467de74fb12a8b948a804a50b5f5a855255dfcc511e6178eef60fbb52db1f5ac94c0727001e626edd77e4e2bf8c19a0c7508ef87cc20e894d546", 0x1000, 0x93f9}], 0x0, &(0x7f0000001540)=ANY=[@ANYBLOB='dots,nodots,nodots,nodots,nfs=nostale_ro,dots,euid=', @ANYRESDEC=r0, @ANYBLOB="2c736d61636b6673726f6f743d2f002c7375626a5f726f6c653d2d757365725c2c7063723d303030303030ff010000303030303030303035332c736d61636b6673726f6f743d2c00000000000000000000000000000000"]) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB='noacl.\x00']) 05:05:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x4c00}) 05:05:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x68}) [ 743.280097] FAT-fs (loop1): Unrecognized mount option "euid=18446744073709551615" or missing value 05:05:43 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xffffff8c, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x600}) [ 743.502242] FAT-fs (loop1): Unrecognized mount option "euid=18446744073709551615" or missing value 05:05:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xffffffffffffffff}) 05:05:43 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x1, 0x4, 0x10000, 'queue1\x00', 0x7}) poll(&(0x7f0000000000)=[{r0, 0x4001}], 0x1, 0x200) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000030) 05:05:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x8cffffff00000000}) 05:05:44 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x8000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x830e0000}) 05:05:44 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x4c000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x2d000000}) 05:05:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000023) 05:05:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x6c000000}) 05:05:44 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = open(&(0x7f0000000000)='./file1\x00', 0x40400, 0x70) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f00000000c0)={r1, 0x1}) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:44 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x10, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x2d00000000000000}) 05:05:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x500000000000000}) 05:05:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x4c00}) 05:05:44 executing program 1: getpgrp(0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:45 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x3f00000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000021) 05:05:45 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='/\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f00000000c0)='noacl'}, 0x30) getpgrp(r0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x2000, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f00000002c0)={0xfff, 0x4}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f00000001c0)=ANY=[@ANYBLOB="186c2c0000000000000000040000000000"]) [ 744.890709] EXT4-fs: 139 callbacks suppressed [ 744.890720] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 744.890720] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 744.890720] [ 744.961382] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 744.980677] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:05:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x7a000000}) 05:05:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xffffff97}) [ 745.030579] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 745.058931] EXT4-fs (sda1): Unrecognized mount option "l" or missing value [ 745.129502] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 745.156626] EXT4-fs (sda1): Unrecognized mount option "l" or missing value 05:05:45 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x40000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:45 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) r0 = syz_open_dev$amidi(&(0x7f0000000380)='/dev/amidi#\x00', 0x1, 0x10000) write$P9_RWALK(r0, &(0x7f00000003c0)={0x16, 0x6f, 0x2, {0x1, [{0x41, 0x4, 0x1}]}}, 0x16) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x291f, 0x40) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000340)={'syz_tun\x00', 0x401}) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB="6e6f61636cca90"]) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffffc00, 0x400081) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x80000001, 0x100000001, 0x4, 0x0, 0x89ce, 0x20, 0x3, {0x0, @in6={{0xa, 0x4e22, 0x20, @local, 0x10001}}, 0x800, 0x4, 0x100000001, 0x2, 0x80000001}}, &(0x7f00000001c0)=0xb0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000002c0)=r3, 0x4) 05:05:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500002e) [ 745.306729] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 745.323374] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 745.323374] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 745.323374] [ 745.369500] EXT4-fs (sda1): Unrecognized mount option "—" or missing value 05:05:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x7a}) 05:05:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x5}) 05:05:45 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x500, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:45 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) mount$bpf(0x0, &(0x7f0000000000)='\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x5}}], [{@permit_directio='permit_directio'}, {@dont_measure='dont_measure'}, {@euid_eq={'euid', 0x3d, r0}}, {@smackfsroot={'smackfsroot', 0x3d, 'noacl'}}]}) 05:05:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xffffff8c}) 05:05:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000025) 05:05:46 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xfffffdfd, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:46 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0), 0x4) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB='naacl,\x00']) 05:05:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x4000000000000000}) 05:05:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x7400000000000000}) 05:05:46 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x4c00000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000029) 05:05:46 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) getpgrp(r0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x3000000}) [ 746.547906] kauditd_printk_skb: 31 callbacks suppressed [ 746.547918] audit: type=1804 audit(1544850346.821:1600): pid=14031 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1041/memory.events" dev="sda1" ino=17187 res=1 05:05:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x3000000}) 05:05:46 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xfffffff6, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) [ 746.670044] audit: type=1804 audit(1544850346.861:1601): pid=14029 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/827/memory.events" dev="sda1" ino=17057 res=1 05:05:47 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) r1 = getegid() r2 = getgid() r3 = getgid() lstat(&(0x7f00000001c0)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000440)='./file1\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x4, r0}], {0x4, 0x7}, [{0x8, 0x2, r1}, {0x8, 0x7, r2}, {0x8, 0x2, r3}, {0x8, 0x4, r4}, {0x8, 0x7, r5}], {0x10, 0x4}}, 0x54, 0x2) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2000, 0x0) ioctl$NBD_DISCONNECT(r6, 0xab08) [ 746.793845] audit: type=1804 audit(1544850347.061:1602): pid=14044 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1042/memory.events" dev="sda1" ino=16518 res=1 05:05:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x5000000}) 05:05:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x1f000000}) 05:05:47 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x74000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:47 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 747.063361] audit: type=1804 audit(1544850347.341:1603): pid=14068 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/827/memory.events" dev="sda1" ino=17057 res=1 05:05:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500003a) 05:05:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xfdfdffff}) [ 747.210882] audit: type=1804 audit(1544850347.491:1604): pid=14085 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1042/memory.events" dev="sda1" ino=16518 res=1 05:05:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xf6ffffff}) [ 747.269516] audit: type=1804 audit(1544850347.541:1605): pid=14086 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/828/memory.events" dev="sda1" ino=16929 res=1 05:05:47 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xc0, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:47 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000000c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000100)='vcan0\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) getpgrp(r0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000001900)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000001a40)={&(0x7f0000001940)={0x1d, r2}, 0x10, &(0x7f0000001a00)={&(0x7f0000001980)=@canfd={{0x3, 0x0, 0x2, 0x81}, 0x33, 0x1, 0x0, 0x0, "aae2398321c9cb989b0f8b6bb9159b0c5d4977cdf1d35ef487baf68f485db754a664117094daf963b20a233329c09e1c945cae84defce01be1417b18c367698f"}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x0) 05:05:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) [ 747.397839] audit: type=1804 audit(1544850347.581:1606): pid=14044 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1042/memory.events" dev="sda1" ino=16518 res=1 05:05:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x8cffffff}) [ 747.525466] audit: type=1800 audit(1544850347.581:1607): pid=14044 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor3" name="memory.events" dev="sda1" ino=16518 res=0 [ 747.599032] audit: type=1804 audit(1544850347.751:1608): pid=14098 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1043/memory.events" dev="sda1" ino=17189 res=1 05:05:47 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x104) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:48 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x4c, 0x0, 0x0, 0x820, &(0x7f0000000240)) [ 747.731314] audit: type=1804 audit(1544850348.001:1609): pid=14116 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/828/memory.events" dev="sda1" ino=16929 res=1 05:05:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x48000000}) 05:05:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000010) 05:05:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:48 executing program 1: getpid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f00000001c0)=0xc) getpgrp(r0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x8004, &(0x7f00000002c0)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}, {@common=@cache_fscache='cache=fscache'}], [{@smackfsdef={'smackfsdef', 0x3d, '/\x00'}}]}}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x800, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000380)={'filter\x00', 0x2a, "c6e69ddd4502a55c031408c16e38c670042a41ec04f3dfe97a991faab20266fbe83cb7a98c0fcbd25204"}, &(0x7f0000000400)=0x4e) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x48}) 05:05:48 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x4c00, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x830e}) 05:05:48 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) socket$nl_xfrm(0x10, 0x3, 0x6) getpgrp(r0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x4000000000000}) 05:05:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:48 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x700, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xfffffffd}) 05:05:48 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) getpgrp(r0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000037) 05:05:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xf6ffffff}) 05:05:49 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x700000000000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:49 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10002, 0x0) mkdirat(r0, &(0x7f0000000080)='./file1\x00', 0x20001) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x1f00000000000000}) 05:05:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x830e0000}) 05:05:49 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x2d000000, 0x0, 0x0, 0x820, &(0x7f0000000240)) 05:05:49 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1f, 0x100) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)=0x80000000, 0x4) getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x3, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f2eec4432ebbc1ed2bc547f7aff31a9d24b747fdcf388155d7c"]) 05:05:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x100000000000000}) 05:05:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xc0000000}) 05:05:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000031) 05:05:49 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xc000000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:05:49 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) r0 = socket(0xa, 0x7, 0x2) getpeername(r0, &(0x7f0000000080)=@pppol2tpv3in6, &(0x7f0000000000)=0x80) 05:05:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x7000000}) 05:05:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xfdfdffff00000000}) 05:05:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:50 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x8cffffff, 0x0, 0x820, &(0x7f0000000240)) [ 749.907123] EXT4-fs: 131 callbacks suppressed [ 749.907132] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 749.934651] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 749.934651] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 749.934651] 05:05:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500000c) 05:05:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x10000000}) [ 750.000530] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 750.012764] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 750.012764] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 750.012764] 05:05:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xfdfdffff}) 05:05:50 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x830e0000, 0x0, 0x820, &(0x7f0000000240)) [ 750.098696] EXT4-fs (sda1): re-mounted. Opts: noacl, 05:05:50 executing program 1: setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000001c0)=0x2, 0x4) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000002c0)) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB="6e6ffdffffff00"]) [ 750.219645] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:05:50 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x6c, 0x0, 0x820, &(0x7f0000000240)) 05:05:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events7', 0x3000, 0x500001c) [ 750.335180] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:05:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x3ff7f8}) [ 750.378730] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 750.378730] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 750.378730] [ 750.477502] EXT4-fs (sda1): Unrecognized mount option "ÿ" or missing value 05:05:50 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xe83, 0x0, 0x820, &(0x7f0000000240)) [ 750.560283] EXT4-fs (sda1): Unrecognized mount option "noýÿÿÿ" or missing value 05:05:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:50 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xc0, 0x0, 0x820, &(0x7f0000000240)) 05:05:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000018) 05:05:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x7000000}) 05:05:51 executing program 1: getpgrp(0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000240)=0x80000000) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f00000002c0)={0x4, "4d53c8d1f0834e546e9350c0753bea331e0842348f81c50d347b9e1acd3caafb", 0x80, 0x8, 0x8e3, 0x4, 0x7}) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000c8a43e210000000000000000000000000000000000000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000080)=ANY=[@ANYBLOB="6e6f61636c2c00d61fdb31a85793234a15cfcee36ff8f1a1dac101440906fb39802a16eccf204f3a4cad318a004c70d06e329a3f14f97760f425370e00e1ab09377f02b4b04bbd7258cff5f693bf2ba18d5b52ff03bd8be11dd7971b234def8a7ce932564337193d5b8737c416522e93935724060fdccefc6d6cb471c9387b9536c691d0"]) 05:05:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xf5ffffff}) 05:05:51 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x6c00000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:05:51 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x830e, 0x0, 0x820, &(0x7f0000000240)) 05:05:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x7400}) 05:05:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x2000000000000000}) 05:05:51 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) quotactl(0x2, &(0x7f0000000000)='./file1\x00', r0, &(0x7f00000003c0)="b441a50d725c2d449026297f4d3416066825128d2dd34930902a46bfda1e5da4c136e87a3e0b8f2ab4221255fa6eab891cb5dab08661836b3e6c107eeef5c6d198fe7a53f2b47684cfabcfbbf9c2bb339f1cb98fa819b4f55edfb485fc582616ff66e942b7a8d9900abe83d25c921e70cd5881348bd0792e98d69d3126d9df5857067cde4170943f4679ce1ca30a0304aa7067a195a93fe53b0c6bf140bec2") mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:51 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x300, 0x0, 0x820, &(0x7f0000000240)) 05:05:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000028) 05:05:51 executing program 1: fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpid() r0 = fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(r0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB]) 05:05:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0xe83}) 05:05:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x8000000000000}) 05:05:51 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x100000000000000, 0x0, 0x820, &(0x7f0000000240)) [ 751.636557] kauditd_printk_skb: 28 callbacks suppressed [ 751.636569] audit: type=1804 audit(1544850351.911:1638): pid=14374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/834/memory.events" dev="sda1" ino=17203 res=1 [ 751.708598] audit: type=1804 audit(1544850351.951:1639): pid=14373 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1050/memory.events" dev="sda1" ino=17200 res=1 05:05:52 executing program 1: r0 = getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) sched_getattr(r0, &(0x7f0000000000), 0x30, 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000080)=ANY=[@ANYBLOB="6e12a5cc560000101b02ee0bef2f0999a0ec7eb92499b89eb362b558fb78d213f7ee3885919a2cb4cd664a8f54baad8d92f69eec84bd1f7f532446ff6e5487f5f00052c21467231204b0d17ddc5abb46328ca13a5ccd89207aa91a95eeb467a7615d963ffc24ce207552b5ffb517918734abcb205885f216b1895cc0165aaef0c67d3ee46ed19e975cce76777e63a5ac0cbb9654eac7d2bc841cb31a3cf0a6a0df0bb3b278070000000000000000000000000000000000000000"]) sched_getscheduler(r0) 05:05:52 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x7400, 0x0, 0x820, &(0x7f0000000240)) 05:05:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xedc0}) 05:05:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x10000000}) 05:05:52 executing program 1: r0 = getpgrp(0x0) open(&(0x7f0000000600)='./file0\x00', 0x210a00, 0x40) syz_open_procfs(r0, &(0x7f0000000640)='net/ip_tables_names\x00') accept4$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700)=0x6e, 0x80000) syz_open_dev$usb(&(0x7f0000000740)='/dev/bus/usb/00#/00#\x00', 0x305b, 0x1) creat(&(0x7f0000000780)='./file1\x00', 0x20) accept4$inet6(0xffffffffffffffff, &(0x7f00000007c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000800)=0x1c, 0x80800) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000840)='(\x00'}, 0x10) fcntl$getown(r1, 0x9) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rtc0\x00', 0x800, 0x0) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000540)=""/126) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r3 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x6a0c, 0x0, 0x1, 0x3, 0x0, 0x2, 0x0, 0x0, 0x140, 0x40, 0x238, 0x58, 0x0, 0x38, 0x0, 0x7, 0xb67, 0x10000}, [{0x0, 0x1, 0xffffffffffffff81, 0x0, 0x0, 0x4, 0x0, 0xcaf1}], "472ee954ceb3c23fa9c54e9f883525a5ba1a547558bc994ad0f1c01ed3dd910d3ee4ee41f29757f3f9ce67ef646b5251863ad5fc5f4c4765d4b3e38e766d7a044cebb59d8eca568181b562ce0bea0b8e978ac3b4b9577b367a16876c382214e5b5accc84"}, 0xdc) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x400040, 0x0) ioctl$NBD_SET_SOCK(r4, 0xab00, r5) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000005c0)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000300)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f00000000c0)=0xe8) quotactl(0x7, &(0x7f0000000080)='./file0\x00', r6, &(0x7f0000000400)="7623e4167b7ac217b80d6aa1917db7bd1dbcf1e309e5e65394cb0cff684f8e4438352b622f2d116d17fd4cf52564c42c4cfc5a04027b726d8e2bf3cbb66e6db180d591eb731a707cb4ae9e94f764d38fb97f3ee5a04e8782f0c0614e32a324cdf77937e04ad9d76c18f4b5552c4a7b6b07966093ffb179e54be48b6e75044b7c6e2db6aa91891a1497d2eaa21adf08206ebfd1de109d90c91af73b9d0ec7c3aa04bad523c287ce13666dd6ac2d07f1b1d05cf7bc6e0903a1a69d38dd37c5b61b990127828a14d02504808e33910b0b064c2a235173f3556c5530") sendmmsg(r3, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x80) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 752.091716] audit: type=1804 audit(1544850352.371:1640): pid=14403 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/834/memory.events" dev="sda1" ino=17203 res=1 05:05:52 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x6800, 0x0, 0x820, &(0x7f0000000240)) [ 752.198374] audit: type=1804 audit(1544850352.471:1641): pid=14408 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1050/memory.events" dev="sda1" ino=17200 res=1 05:05:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000015) 05:05:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:52 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x3f000000, 0x0, 0x820, &(0x7f0000000240)) 05:05:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x68000000}) [ 752.338542] audit: type=1804 audit(1544850352.611:1642): pid=14418 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/835/memory.events" dev="sda1" ino=16689 res=1 05:05:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x4800000000000000}) 05:05:52 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x7a00, 0x0, 0x820, &(0x7f0000000240)) [ 752.489895] audit: type=1804 audit(1544850352.771:1643): pid=14427 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1051/memory.events" dev="sda1" ino=17200 res=1 05:05:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x200000}) 05:05:53 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) semget(0x3, 0x0, 0x1) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 752.684097] audit: type=1804 audit(1544850352.961:1644): pid=14428 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1051/memory.events" dev="sda1" ino=17200 res=1 05:05:53 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x7a00000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:05:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x500000000000000}) 05:05:53 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) r0 = socket$inet_smc(0x2b, 0x1, 0x0) sendmsg(r0, &(0x7f0000001640)={&(0x7f00000002c0)=@in6={0xa, 0x4e21, 0x7, @loopback, 0xffff}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000340)="cb0a5f592e89f575d35823a6dadfe6fa88984f6d2f86753f66121c0496e5edf9bc310d7d9e86884b2778c45f3577ae70bddd471f2bebdd1ff4cf2032f06dd32362090f1283d68c4ac67048eb2024427b404fcf444278e060eb7f9d93111c70eb7afc791d64c1b2ce06c3fc6da92a2e69656d380f4992355af5da3a12147469372d52d603bf2eabae2b97de53459fc62a05c499b04d4cd64d7f2854340663cfd926dccab385a82518e6effdc394b9c982", 0xb0}, {&(0x7f0000000100)="34af3de564f05e3b9ac8f0726a35d6a74639c06f23ff6279", 0x18}, {&(0x7f0000000400)="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", 0xfb}, {&(0x7f0000000500)="8d3ad740f34c6b4c883090f6e750b90e14abf8a47ec6ca75695a3e9a84ba9116b0d4ed438fa36f1141e74c9630182d02376149eaf35f7934ddfcfb81963c027dc8fbeeb172a2ad954f9c12bb5389610331c2cf0d894aa1e5aa", 0x59}, {&(0x7f00000001c0)="fe278f025c0042d8a8741740a83cc65694449ff2692de24bb97e6178474c13", 0x1f}], 0x5, &(0x7f0000000600)=[{0x1010, 0x0, 0x40, "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"}], 0x1010}, 0x44004) [ 752.937980] audit: type=1804 audit(1544850353.211:1645): pid=14461 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/835/memory.events" dev="sda1" ino=16689 res=1 05:05:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001a) 05:05:53 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xfffffff6, 0x0, 0x820, &(0x7f0000000240)) 05:05:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x4c000000}) [ 753.044520] audit: type=1804 audit(1544850353.321:1646): pid=14462 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1052/memory.events" dev="sda1" ino=17200 res=1 05:05:53 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x200000000000000, 0x0, 0x820, &(0x7f0000000240)) [ 753.147422] audit: type=1804 audit(1544850353.421:1647): pid=14468 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/836/memory.events" dev="sda1" ino=17203 res=1 05:05:53 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x3000000, 0x0, 0x820, &(0x7f0000000240)) 05:05:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x68000000}) 05:05:53 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) r1 = getpgrp(r0) r2 = socket$inet(0x2, 0x5, 0xffffffff) fsync(r2) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000080)=0x81) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f00000002c0)={0xb30, {{0x2, 0x4e21, @broadcast}}, {{0x2, 0x4e24, @multicast2}}}, 0x108) getpgrp(r0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6f61636c2c008b880a5c4864f66d2e349a09a1f2de35267d7ed5bb49c2e646b9ec5a7741b8f1314a9e80b1fbd9023be3d59c0e57e27499780fd834a39b6c83587e6d2fa01c5770496e3615394cebbb11f301c87abecc12c6ff05ba9d687e747b6402f55e8a64deb8ebf0c8497e37ce641cb7"]) 05:05:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x8}) 05:05:53 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x4800, 0x0, 0x820, &(0x7f0000000240)) 05:05:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}], [], 0x300}) 05:05:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x2d}) 05:05:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500000d) 05:05:54 executing program 1: setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x280c01, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7f) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x240000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0xaaaaaaaaaaaac5c, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0xff, 0x1, 0x8001, "0c80b7b4e2399b89190516566a7e6ea2", "d4a2d2a47e36647252c21a90dcc27065788804e86f01971221916ae777e72638e40a860fbd0024bf650c44e437d6972d7ac0108b5aef08da72da90089d135a149b57b792ab864a18dfbf26e9b4339c4ea42349bedf7f15000cba1c594dc625ecebfd5dd9ad199b4fce53c356ae888232fe525527ff6f0f22710c72a9b225e3a7080f0999a21d9c401dc9049f2ffcf18b6676222faa08b361b8f9e2723af96fa3b3617ac9c573044ebad4f8683315a972837b999556cade75042f1465debefda5fc18b0da9631da687b3291c1d2f913b83daf95786b1326844b3f9efc5999edf168fa0740dc28232effe5"}, 0xff, 0x1) 05:05:54 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xc0ed0000, 0x0, 0x820, &(0x7f0000000240)) 05:05:54 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0xc0002) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x48260202}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x2c, r2, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}]}]}, 0x2c}}, 0x40000) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000380)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002540)={{{@in6=@ipv4={[], [], @remote}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@loopback}}, &(0x7f0000002640)=0xe8) syz_mount_image$f2fs(&(0x7f00000003c0)='f2fs\x00', &(0x7f0000000400)='./file1\x00', 0x3, 0x3, &(0x7f00000024c0)=[{&(0x7f0000000440)="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", 0x1000, 0xfffffffffffffff8}, {&(0x7f0000001440)="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", 0x1000, 0x7}, {&(0x7f0000002440)="3da83b393dd52b607cf46fb221d0233e6aaaa632c445179a192cff2127d9d93162ae5d5e149bdaea343e7fe6fd0a3d21b47d76f89b16812e721b33f630f4b10d575810cfd7425175bbe471b4d7faa9a46a23", 0x52, 0x5}], 0x8, &(0x7f0000002680)={[{@nodiscard='nodiscard'}, {@two_active_logs='active_logs=2'}], [{@fowner_gt={'fowner>', r3}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@measure='measure'}]}) syz_mount_image$ext4(&(0x7f0000000100)="65f8742d00", &(0x7f0000000140)='./file1\x00', 0x40, 0x0, 0x0, 0x40000820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x6c00000000000000}) 05:05:54 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x7, 0x0, 0x820, &(0x7f0000000240)) 05:05:54 executing program 1: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) getpgrp(r0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000000)=ANY=[@ANYBLOB="3a53aac2d9286e6f"]) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x5, 0x200800) getsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 05:05:54 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x6800000000000000, 0x0, 0x820, &(0x7f0000000240)) [ 754.298477] F2FS-fs (loop4): Invalid SB checksum offset: 699892709 [ 754.334752] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 05:05:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) [ 754.371166] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 754.378348] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 754.387420] F2FS-fs (loop4): Invalid SB checksum offset: 699892709 [ 754.394335] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 05:05:54 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x6c000000, 0x0, 0x820, &(0x7f0000000240)) 05:05:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0xf83f00}) 05:05:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x5000043) [ 754.449654] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 754.467135] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 05:05:54 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xfffffdfd, 0x0, 0x820, &(0x7f0000000240)) [ 754.564911] F2FS-fs (loop4): Invalid SB checksum offset: 699892709 [ 754.587515] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 754.598115] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 754.605702] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 05:05:54 executing program 1: getpgrp(0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x76, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000002c0)={[{@auto_da_alloc='auto_da_alloc'}, {@barrier='barrier'}], [{@obj_type={'obj_type', 0x3d, 'noacl'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}]}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000003c0)='./file1\x00', 0x4, 0x0, &(0x7f0000000500), 0x440, &(0x7f0000000480)={[{@test_dummy_encryption='test_dummy_encryption'}, {@noacl='noacl'}, {@journal_dev={'journal_dev', 0x3d, 0x7950}}, {@barrier_val={'barrier', 0x3d, 0x81}}, {@journal_async_commit='journal_async_commit'}, {@grpid='grpid'}]}) [ 754.613746] F2FS-fs (loop4): Invalid SB checksum offset: 699892709 [ 754.620537] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 754.628450] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 754.637508] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 05:05:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) socket$rds(0x15, 0x5, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000280)={r1, 0x100000001}, &(0x7f0000000300)=0x8) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000340)=ANY=[@ANYBLOB="6efadcda8bc2c7e15e"]) socket$rds(0x15, 0x5, 0x0) 05:05:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x2000000}) 05:05:55 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x2, 0x0, 0x820, &(0x7f0000000240)) [ 754.796203] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 05:05:55 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x8000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:05:55 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1ff, 0x228000) ioctl$RTC_PIE_ON(r0, 0x7005) recvmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/157, 0x9d}], 0x1, &(0x7f0000000380)=""/97, 0x61}, 0x1) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) chmod(&(0x7f0000000400)='./file1\x00', 0x20) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000440)={0x0, 0x4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000004c0)=r2, 0x4) [ 755.013237] EXT4-fs: 77 callbacks suppressed [ 755.013244] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 755.070324] EXT4-fs (sda1): Unrecognized mount option "núÜÚ‹ÂÇá^" or missing value 05:05:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f68636c2cdcd4b5"]) 05:05:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:55 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x500000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:05:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500002a) 05:05:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x6800}) [ 755.159412] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 755.183913] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 755.183913] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 755.183913] [ 755.242044] EXT4-fs (sda1): re-mounted. Opts: noacl, 05:05:55 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x40000000, 0x0, 0x820, &(0x7f0000000240)) [ 755.347600] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 755.347600] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 755.347600] [ 755.458634] EXT4-fs (sda1): re-mounted. Opts: noacl, [ 755.499549] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 755.508122] EXT4-fs (sda1): Unrecognized mount option "nohcl" or missing value 05:05:55 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) connect(r0, &(0x7f0000000300)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x80) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:55 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) ioprio_get$uid(0x3, r0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80400, 0x0) [ 755.581032] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:05:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x2}) 05:05:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)="6d656d6f72792e6576656e747311", 0x3000, 0x500001c) 05:05:56 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x4800000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:05:56 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x4c00000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:05:56 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x2000, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r1, 0x10f, 0x86) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) fsetxattr$security_evm(r0, &(0x7f00000000c0)='security.evm\x00', &(0x7f00000001c0)=@v1={0x2, "98c994a0b53d1ebeee61bcee4ffe44db"}, 0x11, 0x3) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:56 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) prctl$PR_SET_THP_DISABLE(0x29, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x101) mount$9p_xen(&(0x7f0000000040)="f570", &(0x7f0000000240)='./file1\x00', 0x0, 0x7048, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x144, 0x800) accept$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000001c0)=0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000080)=ANY=[@ANYBLOB="6e6f61636c2c00450cac0d8d063b591c3e26a516206d4956540a3a8c80f68f3d3240bbeabab41eade68dea7b4b329470982b47ff030fb37420240484b181ef2fc7f8f4a2d6227ebd5a60a4c5ffbbaa44ab4aeb865349442470064fc2330a3fd5fa49eb6fc089b67e933cd10ec0fae18900084b04bf4033fb71211d4c7797"]) 05:05:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500003b) 05:05:56 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x48000000, 0x0, 0x820, &(0x7f0000000240)) 05:05:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x74}) 05:05:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f61636c2c00900e0390c255b6aba07bb699b78b6002d70d35b7f880d125f834645796e50dcf3cb5bb671a7c551a4093"]) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x4c, r1, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x10001}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000000) 05:05:56 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xedc0, 0x0, 0x820, &(0x7f0000000240)) 05:05:56 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = accept4$llc(0xffffffffffffff9c, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10, 0x80000) bind(r0, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x0, 0x1, 0x3, {0xa, 0x4e22, 0x4, @ipv4={[], [], @multicast2}, 0x8000000000000}}}, 0x80) get_thread_area(&(0x7f0000000000)={0x6, 0x20001000, 0x400, 0x9, 0x2, 0x3, 0x7, 0x3, 0x9, 0x1}) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB="6e6f61e36c2c00"]) 05:05:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x40000}) 05:05:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f00000044c0)=[{{&(0x7f0000000380)=@nl=@unspec, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/197, 0xc5}, {&(0x7f0000000500)=""/199, 0xc7}, {&(0x7f0000000600)=""/181, 0xb5}, {&(0x7f00000006c0)=""/6, 0x6}, {&(0x7f0000000700)=""/127, 0x7f}, {&(0x7f0000000780)=""/83, 0x53}, {&(0x7f0000000800)=""/32, 0x20}, {&(0x7f0000000840)=""/199, 0xc7}, {&(0x7f0000000940)=""/54, 0x36}, {&(0x7f0000000980)=""/6, 0x6}], 0xa, &(0x7f0000000a80)=""/162, 0xa2}, 0x802000000000000}, {{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000b40)=""/131, 0x83}, {&(0x7f0000000c00)=""/81, 0x51}, {&(0x7f0000000c80)=""/98, 0x62}, {&(0x7f0000000d00)=""/38, 0x26}, {&(0x7f0000000d40)=""/243, 0xf3}, {&(0x7f0000000e40)=""/197, 0xc5}, {&(0x7f0000000f40)=""/3, 0x3}, {&(0x7f0000000f80)=""/172, 0xac}, {&(0x7f0000001040)=""/243, 0xf3}, {&(0x7f0000001140)=""/115, 0x73}], 0xa, &(0x7f0000001280)=""/23, 0x17}}, {{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f00000012c0)=""/47, 0x2f}, {&(0x7f0000001300)=""/246, 0xf6}, {&(0x7f0000001400)=""/30, 0x1e}, {&(0x7f0000001440)=""/184, 0xb8}, {&(0x7f0000001500)=""/131, 0x83}], 0x5, &(0x7f0000001640)=""/125, 0x7d}, 0x100000000}, {{&(0x7f00000016c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001900)=[{&(0x7f0000001740)=""/245, 0xf5}, {&(0x7f0000001840)=""/192, 0xc0}], 0x2, &(0x7f0000001940)=""/91, 0x5b}, 0x7}, {{&(0x7f00000019c0)=@alg, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001a40)=""/236, 0xec}, {&(0x7f0000001b40)=""/95, 0x5f}, {&(0x7f0000001bc0)=""/249, 0xf9}, {&(0x7f0000001cc0)=""/98, 0x62}, {&(0x7f0000001d40)=""/33, 0x21}, {&(0x7f0000001d80)=""/57, 0x39}, {&(0x7f0000001dc0)=""/239, 0xef}, {&(0x7f0000001ec0)=""/144, 0x90}], 0x8}, 0x5541}, {{&(0x7f0000002000)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f00000032c0)=[{&(0x7f0000002080)=""/194, 0xc2}, {&(0x7f0000002180)=""/29, 0x1d}, {&(0x7f00000021c0)=""/126, 0x7e}, {&(0x7f0000002240)=""/4096, 0x1000}, {&(0x7f0000003240)=""/117, 0x75}], 0x5}, 0x7f}, {{&(0x7f0000003340)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000003440)=[{&(0x7f00000033c0)=""/79, 0x4f}], 0x1, &(0x7f0000003480)=""/18, 0x12}, 0x9}, {{&(0x7f00000034c0)=@ax25, 0x80, &(0x7f0000003b80)=[{&(0x7f0000003540)=""/238, 0xee}, {&(0x7f0000003640)=""/122, 0x7a}, {&(0x7f00000036c0)=""/7, 0x7}, {&(0x7f0000003700)=""/203, 0xcb}, {&(0x7f0000003800)=""/120, 0x78}, {&(0x7f0000003880)=""/25, 0x19}, {&(0x7f00000038c0)=""/214, 0xd6}, {&(0x7f00000039c0)=""/223, 0xdf}, {&(0x7f0000003ac0)=""/191, 0xbf}], 0x9, &(0x7f0000003c40)=""/238, 0xee}, 0x239}, {{0x0, 0x0, &(0x7f0000004040)=[{&(0x7f0000003d40)=""/205, 0xcd}, {&(0x7f0000003e40)=""/183, 0xb7}, {&(0x7f0000003f00)=""/128, 0x80}, {&(0x7f0000003f80)=""/15, 0xf}, {&(0x7f0000003fc0)=""/6, 0x6}, {&(0x7f0000004000)=""/25, 0x19}], 0x6, &(0x7f00000040c0)=""/202, 0xca}, 0x10000}, {{&(0x7f00000041c0)=@ipx, 0x80, &(0x7f0000004440)=[{&(0x7f0000004240)=""/143, 0x8f}, {&(0x7f0000004300)=""/240, 0xf0}, {&(0x7f0000004400)=""/56, 0x38}], 0x3, &(0x7f0000004480)=""/35, 0x23}, 0x50c7}], 0xa, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000004740)='/dev/cec#\x00', 0x1, 0x2) r2 = syz_open_dev$vcsn(&(0x7f00000047c0)='/dev/vcs#\x00', 0x200, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, &(0x7f0000004780)=0x23b) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) lstat(&(0x7f0000004880)='./file1\x00', &(0x7f00000048c0)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000004800)=0x0) sched_setaffinity(r3, 0x8, &(0x7f0000004840)=0x4) r4 = semget$private(0x0, 0x2, 0x401) semtimedop(r4, &(0x7f0000000000)=[{0x1, 0x9, 0x800}], 0x1, &(0x7f00000000c0)={0x77359400}) mkdirat(r2, &(0x7f00000001c0)='./file1\x00', 0x80) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000240)={0x7f, 0x7, 0x2, "74f31435f714af6a7d59b090025b9ff31ba1831d2745b5f3a3d224b5b9fc8e90", 0x51424752}) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000280)=ANY=[@ANYBLOB="6edcba9f36f7a3ad992c"]) lstat(&(0x7f0000004980)='./file1\x00', &(0x7f00000049c0)) 05:05:56 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x3f00, 0x0, 0x820, &(0x7f0000000240)) 05:05:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:56 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) r0 = syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0xfffffffffffffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x20000000) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f464a1b08a87e636c2c00"]) 05:05:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x3f00}) [ 756.657001] kauditd_printk_skb: 23 callbacks suppressed [ 756.657014] audit: type=1804 audit(1544850356.931:1671): pid=14697 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/840/memory.events" dev="sda1" ino=16517 res=1 05:05:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="0e0000000a00000003000700ca5d62a95b41b28cac7ca6cde8c449d7ed1e580b8c88edec8ba7fd832e7f9d859e37e66cfb57112edaad8ed8512e6e1e38433cdfe5c5e62cb162daaf656868226d615091e486194db1a29f9e9e4a143e0d07ff055a82d62ee01c19ac766f174c98f7971368cea77b3d71a321c96762b69b8154e908e2a045402302d21dc61c839e6b96e231cd2d1e88e21fd77ebb7a1f614a786ddc098d866bef4431f488eb536068115362ab75"], 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(r0, &(0x7f0000000140)="6d656d6f72792e6576654e907204", 0x7a05, 0x1700) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000000)="dd9f04b0e07162cfe00422dd5501683829a7f788ce77c5e51f3c8ccc72c103331e84a1995cba5a4ee666aad894ef27a310e60629be09", 0x36}, {&(0x7f0000000480)="55928e035b7fbd24ea3a0ad2fd3858a5afac3f6ba692514e19b64469c1b91cbb8a09962a4826c8de331211a3e35fbcc7dd4d7472b0f4996232c8e397aaa6f8fcc871d610caef89a38b153af87a8332dc47e533b448e350629aa60b9c7225a3dc27bc4af5ac9060ebf8bbd895a5f6dc51a45652595ebe2864e5c6526cb844ed1f90d962f9", 0x84}, {&(0x7f0000000580)="040fd931898f707333e8f803391299d476251c1f3c816e463da90f049c004bc5f053a842064ab5a3e6e7454a66b7fd5f58439ed1600de71bf7ca23d4cfcc9673acda249f90073dc27b8a9348351da5839625ea3c30dea2a505ef930453cf47623b7e9bebfc51f0ccaf7c9f3527b374dbcd551b8539e9265f15b455494e1662461cf293bad8c9e9f5bcd046e7da0227957a64f290d7f27b96f63bda855862a1e7f0df742d800180b854966ce8f180f15d356ae665c22dfed0c2ee0d179da360ab8c1e53", 0xc3}, {&(0x7f0000000680)="13ee957c32f972e957896377ece84be423b10cbc912bbf25014f46adffd63281e8671e75c605d7a128372dd4bc05b082c44ee8de2c433fe405bcab926463d80bef2a5a1be8eb91d3865c9b553e484fc1d3ad5318adde2fea757484dc8e8441aae2bfd8222f28524ea3eb638f9ebc801452b5a8406a1c7947d4160bcfb3b61df8057f2f5f98ca500d3d3a94764186562b8992ac846d338d7640a755b4ec07c0ce", 0xa0}, {&(0x7f0000000740)="36bdc023dcb16639b93a160a5d9c683a8c862dbc92a3b80dc2de06d99a5237b27860cb4b458a5e7affa76faa67b26f39d94ab0766a3805357f14d3023ac25c9a18193086c19bcb8ee86742a545e69ff5e062deaaf4b30fe1d604421f1c7ce5376cc7a107c4467192924712a756a19843280a3554f2a77b739e82bfe5843dc861b8fcfdd251775069", 0x88}, {&(0x7f0000000800)="97eb9da4f2270cf14efd6a066a40e660e9103f8c2c35529ff4337e68ef7476fc0e7f03ebf2ccf1f8b5815d29e8b19036c2d3f4aff4384c6227133bd80f2be72af7674ebfe7946d25d5e3ae8fe31f67336277f1a459fe93c37b376f38fcd1221f6e61e6241008c291a2", 0x69}, {&(0x7f0000000880)="496ea8cb16c69fbc7aa487a645274bb7cd72d429882f1587e1973a5ac16ea1a1b9e1fc4161bf00825080d6ede4b9f1fcfcac933e13c1b64902d64d2f97e1b837389e", 0x42}], 0x7, 0x0, 0x0, 0x40}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="16fa3f0f6ce632d0ef1ab1a4e0c74c2d1c6c00ce23d6499f7582731f79e1acb3ae0adf22bb4bf1544cfecc16bd3f0855cd207e5d9d962bd919f72ca349fbcec002"], 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:57 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x3ff800, 0x0, 0x820, &(0x7f0000000240)) [ 756.750341] audit: type=1804 audit(1544850357.011:1672): pid=14658 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/840/memory.events" dev="sda1" ino=16517 res=1 05:05:57 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x4c, 0x0, 0x820, &(0x7f0000000240)) [ 756.855063] audit: type=1800 audit(1544850357.011:1673): pid=14658 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor0" name="memory.events" dev="sda1" ino=16517 res=0 05:05:57 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x900, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="0e0000000a00000703000700ca5d62a95b41b2"], 0x13) accept4$nfc_llcp(r1, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) r2 = perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) openat$cgroup_ro(r1, &(0x7f00000002c0)='pids.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x8) r3 = gettid() getpeername(r2, &(0x7f00000005c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000640)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000680)={'vcan0\x00', r4}) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r3, 0x3, r1, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) [ 756.893916] audit: type=1804 audit(1544850357.091:1674): pid=14699 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1058/memory.events" dev="sda1" ino=17226 res=1 [ 756.921680] audit: type=1804 audit(1544850357.111:1675): pid=14708 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/841/memory.events" dev="sda1" ino=16527 res=1 05:05:57 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x4, 0x0, 0x9, 0xfffffffffffffff9, 0x3}, &(0x7f0000000580)=0x98) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000005c0)=@assoc_value={r1, 0x1}, &(0x7f0000000600)=0x8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000100)={"e4de0b112b45c799e57b922091a98ab6", 0x2}) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext-\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB="6e9fec6f61636c"]) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000400)={0x3, "0351367e6751e2290e37212f3c15728933b3587d293bd0a9ff40e59558cfa389", 0x3, 0x1}) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1ec680, 0x129400) statx(r3, &(0x7f0000000140)='./file1\x00', 0x1000, 0x2, &(0x7f0000000300)) [ 756.949937] audit: type=1804 audit(1544850357.121:1676): pid=14711 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/841/memory.events" dev="sda1" ino=16527 res=1 05:05:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0e0000000a00000003000700cacb"], 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) r1 = perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = fcntl$getown(r1, 0x9) prlimit64(r3, 0xe, &(0x7f0000000280)={0x3ff, 0xb8d6}, &(0x7f00000002c0)) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r4 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r4, 0x3, r0, 0xb) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x2d00}) 05:05:57 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x40, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x100, 0x0) fanotify_mark(r0, 0x1, 0x40000000, r1, &(0x7f0000000300)='./file1\x00') r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000080)={0x0, @reserved}) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:57 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x10, 0x0, 0x820, &(0x7f0000000240)) [ 757.258011] audit: type=1804 audit(1544850357.531:1677): pid=14728 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/843/memory.events" dev="sda1" ino=17205 res=1 [ 757.386763] audit: type=1804 audit(1544850357.651:1678): pid=14740 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1058/memory.events" dev="sda1" ino=17226 res=1 05:05:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:57 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xf8f73f00, 0x0, 0x820, &(0x7f0000000240)) 05:05:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x800, 0x2c00) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e24, 0x401, @empty, 0x5951ab76}}, 0x20, 0x1f}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r1, 0x8, 0x3f, 0xa9}, &(0x7f0000000280)=0x10) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f00000003c0)={0x3, 0x9, 0x1000, 0x0, 0x8, 0x7}) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) r2 = getpgid(0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000400)=r2) 05:05:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x5000000}) 05:05:57 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x500, 0x0, 0x820, &(0x7f0000000240)) 05:05:57 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f6163a4ff73806fc656"]) [ 757.568785] audit: type=1804 audit(1544850357.841:1679): pid=14754 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1059/memory.events" dev="sda1" ino=17228 res=1 05:05:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[], [], 0x830e}) 05:05:57 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x400000000000000, 0x0, 0x820, &(0x7f0000000240)) [ 757.725808] audit: type=1804 audit(1544850358.001:1680): pid=14765 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/843/memory.events" dev="sda1" ino=17205 res=1 05:05:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:58 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0xbe, 0x4) 05:05:58 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x10000000, 0x0, 0x820, &(0x7f0000000240)) 05:05:58 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000000)=0x4000000) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB]) 05:05:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f00000002c0)='./file1\x00', 0xffffffffffffffff) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 05:05:58 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xfffffdfc, 0x0, 0x820, &(0x7f0000000240)) 05:05:58 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x830e000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:05:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x8, 0x0) write$P9_RWSTAT(r0, &(0x7f00000001c0)={0x7, 0x7f, 0x1}, 0x7) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000000)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:58 executing program 1: getpgrp(0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:58 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 05:05:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80000, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e24, @multicast1}, 0x10) r1 = getpid() ptrace$setsig(0x4203, r1, 0x3, &(0x7f0000000300)={0x35, 0x5, 0x8}) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$P9_RREADDIR(r2, &(0x7f0000000040)={0xb}, 0xb) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000007, 0x11, r2, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000280)={0x7ff}, 0x1) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0e0000000a00001f03000700ca5d62cc8e41b2"], 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r3, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r4 = gettid() prctl$PR_SET_FP_MODE(0x2d, 0x3) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r4, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:58 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xfdfdffff, 0x0, 0x820, &(0x7f0000000240)) 05:05:58 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000000c0)) getpid() getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) getpgrp(r0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8040, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f00000002c0)={{0x0, @name="f14f208e077ed7c61930630fdbb0c02ca136a18e57ef6047d0d85ac0649ee13e"}, "7c00213133b0d4d39f930a4c778fee3e3ead109bb5f93c0d114ab52edb3e51f6", 0x1}) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000080)=ANY=[@ANYBLOB="6e6f61c84fbbb85018000000000000"]) 05:05:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000300)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x704c, &(0x7f00000003c0)=ANY=[]) truncate(&(0x7f0000000280)='./file1/file0\x00', 0x0) pipe2$9p(&(0x7f00000002c0), 0x4000) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x81d, &(0x7f0000000240)) setxattr(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="73656375722959692e00a91e71812ceafdada1dfa5f99f82304c51f5805c02affce1661d8d790789b00dad36e590abfa224035bf00b40d7f0093da6201095d49ab6ff4744d6d8c5816babfb33a2e0805788b0a036975c2cf64006dcb6344e8848d7f6d003c3d9e1e85bbd2e1f738dda943345402ac63eb5334ee635fdcd7644fa69075558637e3e3070a4ba8e629ef00be0d586be3d066066d55809692204b95d96c49f872"], &(0x7f00000001c0)='ext-\x00', 0x5, 0x3) 05:05:59 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xfcfdffff, 0x0, 0x820, &(0x7f0000000240)) 05:05:59 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-monitor\x00', 0x40, 0x0) sendto$inet6(r0, &(0x7f0000000680)="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", 0x1000, 0x20000000, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @empty, 0xfffffffffffffffb}, 0x1c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r1, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000001c0), 0x12) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000380)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@mcast2, @in6=@dev={0xfe, 0x80, [], 0x1c}, 0x4e24, 0x66, 0x4e24, 0x5, 0xa, 0xa0, 0xa0, 0x16, 0x0, r3}, {0x4, 0x7fffffff, 0x0, 0x9, 0x0, 0x3, 0x69}, {0x3, 0x8001, 0x6, 0x5}, 0x100000001, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in6=@ipv4={[], [], @local}, 0x4d6, 0xff}, 0x2, @in6=@mcast1, 0x3507, 0x3, 0x3, 0x2, 0x8, 0xffffffffffffffe0, 0xe03}}, 0xe8) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r4 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r4, 0x3, r1, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:59 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x820, &(0x7f0000000240)) 05:05:59 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB='noacl,T']) 05:05:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x2) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000300)={'filter\x00'}, &(0x7f00000000c0)=0x44) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000001c0)=0x40, 0x4) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x0, @dev}}, 0x0, 0x6, 0x0, "b6f73b6e690dfa12c023fe736a343f8b70bbfadd0b2b7917794acb5f197a68d966aa0b5a5f41ca2b6204d8bac209c26d4b213ba809a1c6e983a2b18c3657b1710a93895ee1e98fb8566092d73d71d352"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000014c0)={@in={{0x2, 0x0, @dev}}, 0x0, 0x0, 0x0, "4ae9645a4bdbefd0187f1e35cba955127c7ca8b982f7408054208a36ee7b341bc01b6d8d52e8ee57c61ec7f041e965466b7a2d4cec6a16d568c9683cac6791e3bef5d31b03d40e4f5f68137e44379c3b"}, 0xd8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3f, 0x80000) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f00000001c0)={0x5, 0x9, 0x6}) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x200000, &(0x7f00000002c0)) 05:05:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:05:59 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)=0xff, 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:59 executing program 4: syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x1, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) socketpair(0x7, 0x800, 0x200, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="00000002", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000300)=0xc) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000340)={r2, 0x3, 0x0, 0x5}, 0x10) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) 05:05:59 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x3f00000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:05:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(0xfffffffffffffffe, 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 05:05:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="5b41be92000000000000000000000000008f01"], 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)="6d656d6f10e22675000072007300", 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)={0xffffffffffffffff}, 0x117, 0x1006}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f00000004c0)={0xa, 0x4, 0xfa00, {r2}}, 0xc) write$cgroup_int(r0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00'], 0x200600) r3 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r3, 0x3, r0, 0xb) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, &(0x7f0000000300)="000000000000000000000000004108d20e3a2bf899c2f7d98d56b0ad00369c28525e2ee9378b7a1b76ec1d005c72a86055f523e68a41110eeceab62080f9b6e85a2c6380da58aa010205ad9542b3db24683c3aee0374e03fb4f7bbab2c86746a45bfd1e70feb9f0e7ee01e8c91cc22d113635883ca0477f9810909a0b8dd17b68a6b738383a21d8bfc7b9a", 0x3000, 0x500001c) 05:05:59 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400000, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080)=0x8, 0x4) getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6fa4ddf17985b90227344e0ced1428c09f7c4ebb77e6072b06ca90c5c6a7cde774d7c730715c54284863dc564de38ce78fc308e6b626f230690c64dac7249bef601d650caed79330a9f54a2dcd68e702de4381177504bd372f39916c63705d7dfa256d06de640cebdbba48cf3f96f1ee50bee2b0187085b9f676b58305d63bd8c9f3368506bdb85fd89064cc3436b484fcd9746a8dcbed727fed9d64e1a42a92ae0dc4811cdb6bb56886af4ba8"]) 05:05:59 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x700000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:05:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x48800, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f00000001c0)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) execve(&(0x7f0000000000)='./file1\x00', &(0x7f0000000380)=[&(0x7f0000000280)='\x00', &(0x7f0000000300)='noacl', &(0x7f0000000340)='/!\x00'], &(0x7f0000000500)=[&(0x7f00000003c0)='/\x00', &(0x7f0000000400)='{lo,\x00', &(0x7f0000000440)='/\x00', &(0x7f0000000480)='9p\x00', &(0x7f00000004c0)='9p\x00']) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:05:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x1b5f250173789a79) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000280)) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 05:06:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000), 0x0) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:00 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x80000000001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x100a}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000002c0)={0x9, 0x108, 0xfa00, {r1, 0x15, "58a9a7", "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"}}, 0x110) 05:06:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f00000003c0)={0x4, 0xb, 0x36, "57c3bbc8f476dd3f885ab36fdb3b474ac0922caac555f6a8846a9cb20bcb6bcc32829d451dae6417a410ae1e77115255cbb581797ec6a2e2df718aff", 0x25, "59e44b0e9c1c5163f17ef2d5438d3a733a9df8abb2db49114ea8ed0018f837d669ad6eb8a51cfdd6f404512915b89090bc9d4710cfe6def58dfe8e33", 0x80}) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]) 05:06:00 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xedc000000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) [ 760.120299] EXT4-fs: 84 callbacks suppressed [ 760.120327] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 760.120327] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 760.120327] 05:06:00 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xf5ffffff, 0x0, 0x820, &(0x7f0000000240)) [ 760.217190] EXT4-fs (sda1): re-mounted. Opts: noacl, 05:06:00 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 760.238732] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 760.273225] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 760.273225] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 760.273225] 05:06:00 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xf83f00, 0x0, 0x820, &(0x7f0000000240)) [ 760.330364] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 760.364283] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:06:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x79fdbcc6, 0x2000) inotify_init() mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) 05:06:00 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xc3, 0x2d0}, 0x0, 0x0, 0x0, 0x9}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x41) openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000240)=0xe8) mount$bpf(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='bpf\x00', 0x80080, &(0x7f0000000580)={[{@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x7fff}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x200}}, {@mode={'mode', 0x3d, 0x200}}, {@mode={'mode', 0x3d, 0x400000000000}}, {@mode={'mode', 0x3d, 0x80000001}}], [{@fsmagic={'fsmagic', 0x3d, 0x8}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@obj_role={'obj_role', 0x3d, '9p\x00'}}, {@euid_gt={'euid>', r2}}]}) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000300)=ANY=[@ANYBLOB="4b436a54e92ed9006ae523971023ceba00006d9483f28947db3b741f2f7c897d08c2046ee7c2ef0ef3ded10f66ea7faee298665337ce64856590e2000200000000000039080f95b4e24855c986e824654f07ad31f266255983c54ee08dc43da537ee293ad4febcd0543b8c9577bc8cefe1f9572b0ed0356363f4868dc6"]) [ 760.528433] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 760.528433] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 760.528433] 05:06:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)="6d656d6f72792e6576656e7473ff", 0x3000, 0x500001c) 05:06:00 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x4c00, 0x0, 0x820, &(0x7f0000000240)) [ 760.651165] EXT4-fs (sda1): re-mounted. Opts: noacl, 05:06:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x100ba) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:01 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x1) write$P9_RFSYNC(r1, &(0x7f00000001c0)={0x7, 0x33, 0x2}, 0x7) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) r2 = getpgrp(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, r0, 0x0, 0xb, &(0x7f0000000340)='/dev/midi#\x00', 0x0}, 0x30) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000400)=0x3001) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r2, r1, 0x0, 0x2, &(0x7f0000000300)='/\x00', r3}, 0x30) r4 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x400, 0x200) ioctl$KVM_SET_DEBUGREGS(r4, 0x4080aea2, &(0x7f0000000280)={[0x7000, 0x3000, 0x105000, 0x100000], 0x39, 0x40, 0x5}) [ 760.727303] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 760.727303] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 760.727303] [ 760.780934] EXT4-fs (sda1): re-mounted. Opts: noacl, 05:06:01 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x2d, 0x0, 0x820, &(0x7f0000000240)) 05:06:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:01 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @broadcast}}}, &(0x7f00000001c0)=0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000002c0)={r1, 0x9}, &(0x7f0000000300)=0x8) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) utimes(&(0x7f0000000280)='./file1\x00', &(0x7f0000000300)={{0x0, 0x2710}, {0x0, 0x2710}}) r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c, 0x80000) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000001c0)=@int=0xcbb, 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) 05:06:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x285, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20102, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000300)=ANY=[@ANYBLOB="007560848b788832daac5adf6748acb5857890e2cad639452824b555c284fca6d9263a2da8b8896455474532148c7ee470d3bc1230a6fbe44c5b39da6bc72a3912511de1114c1ddd70bfb615d2540558dfae61184aaac4c1af6f5ddac867533b67922136d6d8e0681394dcf1d24656615206d2e67e4545090e244ef11ca084561d4ce942ab994b021ccc0b71bce055f06d7bf4689414dd3c3a23adeea7d80ef2ba6dc0a6b6ffe60b7ca1283bceca"]) 05:06:01 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x4, 0x0, 0x820, &(0x7f0000000240)) 05:06:01 executing program 1: setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000280)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:01 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000001c0), 0x4) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000500)="1683ad2c0000e6c07936a36c186c1c621fcda9e2b1467a5b8a9536d06930e31d7f1d6495959b6f929d84f0c2b87c4b3a7c417e5b859561fdd315b474fb86bcb3099dd856a396519ebb371e3ea69e930354b7b6047ce02644f47825c261556def1fc4573f33f0e5ab3129e7500752331847a33df404018945995d96e6fea7fd0f3bd61d5a46a6dc57feafa9c969bba6164cf61f6befc84dbf1e389b6316ce9a0c8b51e5cf6cb73b816d779353e5e4f14473a5976f31607714", &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000480)=ANY=[]) llistxattr(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)=""/63, 0x3f) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 05:06:01 executing program 1: mount$9p_tcp(&(0x7f0000000340)='127.0.0.1\x00', &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='9p\x00', 0x820002, &(0x7f0000000400)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@aname={'aname', 0x3d, '@'}}], [{@dont_measure='dont_measure'}]}}) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000080)={{0x2, @addr=0x80000001}, 0x8, 0x9, 0x1f}) r1 = getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000000c0)={0xfff}, 0x4) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000100)={0xffffffff00000000}) getsockname$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000440)={@remote, r2}, 0x14) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0e0000000a0000001e000700ca5d62a95b41b2"], 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, r0, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000900)={0x53, 0xfffffffffffffffc, 0x5b, 0x7, @scatter={0x7, 0x0, &(0x7f0000000740)=[{&(0x7f0000000280)=""/161, 0xa1}, {&(0x7f0000000340)=""/32, 0x20}, {&(0x7f0000000580)=""/200, 0xc8}, {&(0x7f0000000380)=""/82, 0x52}, {&(0x7f0000000480)=""/23, 0x17}, {&(0x7f0000000680)=""/146, 0x92}, {&(0x7f00000004c0)}]}, &(0x7f00000007c0)="29fa4201542bea9210a6cdf1a27b18c222a6a52ca35610b2247dddb7c945a9cb033ade7b381a856623eedcd04ccd1455f547b5a1db2e6fc731be0fb343d7084a160c22c8f68761c921872d37be2e1dde9b39eb88f18d6841487f90", &(0x7f0000000840)=""/153, 0x4, 0x2, 0x2, &(0x7f0000000500)}) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000980)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000a80)=0xe8) getgroups(0x4, &(0x7f0000000ac0)=[0xee01, 0x0, 0xee01, 0x0]) fchownat(r3, &(0x7f00000004c0)='./file0\x00', r4, r5, 0x1800) 05:06:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB="6e6f61636c2cd1"]) 05:06:01 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:02 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) [ 761.714874] kauditd_printk_skb: 30 callbacks suppressed [ 761.714886] audit: type=1804 audit(1544850361.991:1711): pid=15034 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1066/memory.events" dev="sda1" ino=17235 res=1 [ 761.865579] audit: type=1804 audit(1544850362.021:1712): pid=15038 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/851/memory.events" dev="sda1" ino=17239 res=1 05:06:02 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x10000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) r0 = accept4$llc(0xffffffffffffff9c, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000000c0)=0x10, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x40, 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:02 executing program 5: unlink(&(0x7f0000000000)='./file1\x00') r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000280)=""/212) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='_\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 05:06:02 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x80000, 0x0, 0x820, &(0x7f0000000240)) 05:06:02 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x11f) mkdir(&(0x7f0000000180)='./file1\x00', 0x20000000000) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x10b) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) [ 762.300804] audit: type=1804 audit(1544850362.571:1713): pid=15036 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/851/memory.events" dev="sda1" ino=17239 res=1 [ 762.389043] audit: type=1804 audit(1544850362.601:1714): pid=15068 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1066/memory.events" dev="sda1" ino=17235 res=1 [ 762.421790] audit: type=1804 audit(1544850362.631:1715): pid=15034 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1066/memory.events" dev="sda1" ino=17235 res=1 [ 762.452003] audit: type=1800 audit(1544850362.631:1716): pid=15034 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor3" name="memory.events" dev="sda1" ino=17235 res=0 05:06:02 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='cpuacct.usage_sys\x00', 0x26e1, 0x0) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x3) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1e4000800a006c77186a3b000003000700ce5d62a95b41b2"], 0x13) accept4$nfc_llcp(r1, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000300)={0x1, 0x79b1, 0x8b, 0x5}, 0x8) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f00000004c0)=""/97) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r2, &(0x7f00000003c0)={[{0x0, 'memory'}]}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x8) syz_open_dev$binder(&(0x7f0000000380)='/dev/binder#\x00', 0x0, 0x802) r3 = gettid() getsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f0000000280), &(0x7f00000002c0)=0x4) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r3, 0x3, r1, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000100)={0x80000001, 0x10001, 0x100000001, 0x8, 0x9}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) ioctl$RTC_RD_TIME(r4, 0x80247009, &(0x7f00000000c0)) 05:06:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80800, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in=@dev, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)="6d656d6f72792e6576656e7473f6", 0x3000, 0x500001c) 05:06:02 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x6000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:02 executing program 1: getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x40042, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x284000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 762.484708] audit: type=1804 audit(1544850362.731:1717): pid=15074 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/851/memory.events" dev="sda1" ino=17239 res=1 05:06:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000280)={0x0, 0xfff}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000300)={r3, 0x7f, 0x6, [0x100000001, 0xa0d, 0x1000, 0xfffffffffffffffe, 0x7, 0x80000001]}, &(0x7f0000000340)=0x14) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:02 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000000)=0x5) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x1, 0x1000, 0x10001, 0x2, 0x0, 0x2, 0x80, 0x9, 0x3b7a, 0x9, 0x9, 0x800, 0x6, 0x8000, 0x8001, 0xffff, 0x9, 0x3, 0x4, 0x8001, 0x4, 0x7, 0xffff, 0x8, 0x10001, 0x2, 0x4, 0x8, 0x1ff, 0x7fff, 0xba2, 0x2, 0x3ff, 0x33, 0x1, 0x4c99ce4, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xffffffff}, 0x8000, 0xabf6, 0x40, 0x7, 0x41, 0x1, 0x3}, 0x0, 0xc, r0, 0xb) 05:06:02 executing program 1: r0 = getpgrp(0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000080)='\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x94000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYRES64=r0, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES32=r0, @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="ac0186a9c94de18ff98368e5ade8e5ccc01e96a2ae1a70a4237901157c1982", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESDEC=0x0], @ANYRESDEC=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRES64=r0, @ANYRES16=r0, @ANYRES32=r0], @ANYRESHEX=r0]) 05:06:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events:', 0x3000, 0x500001c) 05:06:03 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x3, 0x0, 0x820, &(0x7f0000000240)) [ 762.675383] audit: type=1804 audit(1544850362.951:1718): pid=15095 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/853/memory.events" dev="sda1" ino=16527 res=1 05:06:03 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4000000000000, 0x80000) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000001c0)={0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @local}]}) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB='\boacl,@']) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r2, 0xa00, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) 05:06:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events!', 0x3000, 0x500001c) 05:06:03 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x1000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:03 executing program 5: r0 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x6, 0x80200) write$P9_RREADDIR(r0, &(0x7f0000000300)={0x128, 0x29, 0x2, {0x7fffffff, [{{0x0, 0x3}, 0xdc, 0xffffffff, 0x7, './file1'}, {{0x3, 0x2, 0x8}, 0x300000000000000, 0x7, 0x7, './file1'}, {{0x41, 0x2, 0x8}, 0x3, 0x7, 0x7, './file1'}, {{0x4, 0x3, 0x7}, 0x5, 0x0, 0x7, './file1'}, {{0x88, 0x3, 0x4}, 0x8, 0x4, 0x7, './file1'}, {{0x20, 0x2, 0x5}, 0xb70000000000, 0x93f, 0xd, './file1/file0'}, {{0x80, 0x2, 0x4}, 0xc63, 0x0, 0x7, './file1'}, {{0x2, 0x4, 0x6}, 0x10001, 0x6, 0x7, './file1'}, {{0x3a, 0x2, 0x6}, 0x2, 0x6, 0x7, './file1'}]}}, 0x128) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000002c0)={@mcast2, 0x72, r2}) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000440)=ANY=[@ANYBLOB="ff4d5a146f6eba66c0c1f7a54698599941dd69b71ca7e02d994b0611824bcf2f1f8aefe7d577e78cb3f54bbb12b626d89bc69fc11ed8cf2e25f52dd4141f58c9c9c865f4d9abd699af44c07adf010d5be7d66dc0f4aaf2cfc2dca33486eea1e9d94a8dbf9f209a8ab9daec8fc771771cc07fb143fae9232408674d03099c983725ff6e24e882fff1b48457348c6d9150ab5f0bda66708452eb27a6b6de71d4d1a2a171abded31899ed8b9034b10066468f71700206905a37dcbf68b25fd9076c26e112ac6580ef45d8d8232a01d80508c3b7cbafb3eb83"]) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x40, 0x200) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x3) 05:06:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events-', 0x3000, 0x500001c) 05:06:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) [ 763.205063] audit: type=1804 audit(1544850363.481:1719): pid=15138 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/853/memory.events" dev="sda1" ino=16527 res=1 05:06:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) r1 = accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) r3 = fcntl$getown(r1, 0x9) timer_create(0x5, &(0x7f00000002c0)={0x0, 0x10, 0x4, @tid=r3}, &(0x7f0000000300)) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r4 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r4, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) connect$bt_rfcomm(r2, &(0x7f0000000280)={0x1f, {0x9, 0x1, 0x0, 0x2, 0x8000, 0x400}, 0x1}, 0xa) 05:06:03 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x4000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000300)="034729904db0a37306e4e6c3dc3970ca05b15671c337e74a14fd2fd516c60000d17a5d95d03a5a51c38469c6bb5aa88740d7dca0884542363d7354649a8290cf039e980d2b7d815cfee530e0bb82c960e7da66af00243ab1afb2411e276d439997ce728f3c52e846c7a3c8c9ab7e675ca0383bb8a4e142cb84d039b20505378fd306f550302077a6b87e", &(0x7f00000001c0)='./file1\x00', &(0x7f0000000000)='9p\x00', 0x7045, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 05:06:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = socket(0x6fd878013ad6893c, 0x5, 0x2) accept4$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x80000) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 05:06:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:03 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x1f00000000000000, 0x0, 0x820, &(0x7f0000000240)) [ 763.425237] audit: type=1804 audit(1544850363.701:1720): pid=15153 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/854/memory.events" dev="sda1" ino=17199 res=1 05:06:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x200001) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)='./file1\x00', r1, &(0x7f0000000280)='./file1\x00', 0x7) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) llistxattr(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)=""/63, 0x3f) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) 05:06:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, r0) 05:06:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x400000) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='lp\x00', 0x3) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00']) syz_open_dev$binder(&(0x7f00000001c0)='/dev/binder#\x00', 0x0, 0x802) 05:06:04 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xc000, 0x0, 0x820, &(0x7f0000000240)) 05:06:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="90178e600efffffffffffffff7c50700ca5d62"], 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x41200007}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x3, 0x100, 0x70bd28, 0x25dfdbfc, {0xf}, [@typed={0xc, 0x4b, @u64=0x10000}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x24008004) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) keyctl$unlink(0x9, r0, 0x0) 05:06:04 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) fcntl$dupfd(r0, 0x42b7213177ee41b3, r0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 05:06:04 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x4000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000280)='posix_acl_access{\x00', &(0x7f00000000c0)='./file1\x00', &(0x7f0000000000)='9p\x00', 0x1000000, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:04 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x20000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:04 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdir(&(0x7f0000000180)='./file1\x00', 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000000c0)='./file1\x00', 0x200, 0xa, &(0x7f0000000900)=[{&(0x7f0000000280)="7d5b5e32b1f89312f56f68c5501203341a25817a2f3a661423cfbc1aeeb76ea2e39a2d85c9c1a0b830a3034d3f3164781958174da74cd990f1587c99297df26e8254baab1e19a9ee85173dc90f4e884e91f663abcdf5e4d2f7b2fe0db960014e5a4520010171a7dbac26aebcd9383cbbb6305767fef8ee9c4a6e938e2ef575d66d7ee4f483245f0ea71b3a34d8e5d40c813cf3bbca514db79f0d8ce879bc4508eca3b97e3db036b45dc0920ed6475b8e50ea22b94beb95d2d503c0455fdd8f2a4d4f0c21694e4c169b70308f0ea049a104214aef6a14ee216df701d81d63515154e8911c7b8d4362bbeb244f17055c6ddd9c", 0xf2, 0x9}, {&(0x7f00000001c0)="91cc2939a09ff391b36f215fc034feff9777c0a4f1", 0x15, 0x2}, {&(0x7f0000000380)="7097b3ac7f2843b1dfd974ab36e5002b72344f3747d82467f1660a3a1bbf2cf3eeaa22b7225887a574bdd10a6903775982b24a144343a43fdf5b644254f75b1dc9f77c071f04c85a43ff89b4d785d41bcffc742d2e8fbd766cbfda55c66bb7891e52ba8712a69d02b21060e6b8095c6fc2afb94bfd5917200ea23efb2819f706ee2854cb758a7cca401f1af2d0b945c7cd5215d38c30c649865a78fccf3143243e0014c0bc40b81011fa2b57be5fdb6bc0551e01582433bdbb941c8b0ff36003", 0xc0, 0xfffffffffffffff8}, {&(0x7f0000000440)="fe52a82b7f6c4af1605833b01d5a88708b5601d7511061049666f20a4b94e45493541162498d6568fc57725599f90473cb9455bed6b40652cd7a7895439f0587fb250b06f8e262c269f602018f52d1824c0de96b0112b225b55ff14f9231096bb67639cfb44d07279d2ca23f9d9b7e4796f81559555b03b7ac8e7afef845ff372dd1d9bfa186a853b0dcecec6fe454da5e771aaf3551b50f82e31f43ea497d75e40fa274834b357829d7", 0xaa, 0x2}, {&(0x7f0000000500)="2b29b9fd05b0a84952a111c8968295127c2493b5d33811afdcae6c083f99cb538fb010557b863baba04ac7d19ae9264bd5b5bd1cd032b4cc19ad3a6e791af04dcdb15cae265ed4595da08d95e653283392019b70047684623d9d44469564977e0bd4e51e3a36", 0x66}, {&(0x7f0000000200)="d444b59342a5", 0x6, 0x5}, {&(0x7f0000000580)="b29c5a6a2baf22a4fc8502d950fece2d7516df59e203f6e1a4caf81e559fe316e9c6d2aea5d19d292d51e74d77b08a63f903687035d49d61d1fd1d8d3f68181add73e2490fc82454d65ef7e544fbf342330cc7d51ee78989c9c976bbc3ebaa8e1276b8eaf05008653ff44a4719ea63896c14b39634b3d2235094367d2844d21b671c0eb16edcee49be34af3f23224c8fa6b713055a8c383593bd745f335b9366e5556dd661f076bf788a10f102092be4cd70d19addcadd4488962a9755371fcd78568f10", 0xc4, 0x8}, {&(0x7f0000000680)="5a510786a1c0e00c7ccd00aeb369650a95208313a99de6ac0661ca718e2ab5680a64acb70813cfc360a4b699fda49e630104ee53ea847103505a9f2e9011d6d4f48d124f0b81f3556b7c26db7a625c606d9aa61dcf859a499d15761f82f1972bfb4c4bc8f07674787dadf87ac8a8999bd8add0e43a80538bd8fb8bd675b2e25e2223a65b2266715836dd63da869d64c35fe19b6d48db2d113aa1b23c47607dd0c9883e6440d1b27b40e5165c0e5e22560cb00fec6519bee636e2419d3d2463475c33873521ae98257968e416befe0c3bd6dc50", 0xd3, 0x7ff}, {&(0x7f0000000780)="928befc02c0cc1d6925f2a55a40333ca3660ff3364a2def51754b2c5abf855e48c7ada4b3919395763b7c2d405f464889aaec75f4c83288be52c20c6dbe2f92a67b16e16b3de7325247134684119deef0544feed79b9415a231152698eb43466a95320249faca4381bbc1e5b299b3054ecace10889c0a7bf8a79fb0e45b849d7372888ba34c7f746aa656ced72d0a878bbf2f50eaf5e8ae80d370cd80ffcb8cc5fe7", 0xa2, 0x10001}, {&(0x7f0000000840)="27cf8e8fcd7b0683316f5d6e6a0ebfc0dc83e60007d60c9f3e145dafc9e35ebb86f33d9893e112589b25686c544d07a46021128340895f4670cebc3b73e668812e1b0a7fa26e3a42f087c44ba2139490e234428c38ec1cf5f180d2cf92f997f318534224dc6c5b01aa8317b74fe808181446f40b99092aaa464d4e0567622c0748fa5fcb7835", 0x86, 0x1}], 0x1000, &(0x7f0000000a00)={[{@max_batch_time={'max_batch_time', 0x3d, 0x3}}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@mblk_io_submit='mblk_io_submit'}, {@journal_async_commit='journal_async_commit'}, {@sysvgroups='sysvgroups'}, {@nolazytime='nolazytime'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@context={'context', 0x3d, 'user_u'}}, {@fowner_lt={'fowner<', r0}}, {@measure='measure'}, {@measure='measure'}, {@pcr={'pcr'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@dont_measure='dont_measure'}]}) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 05:06:04 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x2000, 0x0, 0x820, &(0x7f0000000240)) 05:06:04 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) [ 764.446054] 9pnet_virtio: no channels available for device posix_acl_access{ [ 764.536794] 9pnet_virtio: no channels available for device posix_acl_access{ 05:06:04 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x400000, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000003c0)) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f00000002c0)={{0x4, @addr=0xffffffffffffffc1}, "05000000d1b4362f2a5ead721fb8fd9776cd6b891b2c76a0316170ce00", 0x2}) fstat(r0, &(0x7f0000005b00)) mkdir(&(0x7f0000000480)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0xfffffffffffffffd, 0x0, &(0x7f0000001800), 0x820, &(0x7f00000000c0)=ANY=[@ANYBLOB="33a0e49011132d1f6d0885ecc7c098734f3c4236a2715b00735b1592fbdcfa6c7dc695b671fd4be4d5256aaf4c977ad7826fbc1fde51da782d000000eb011418d3a3e21d8bb2120cd8ba7a7f4e7ea8589c695d1a08003d53e871"]) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x102, 0x0) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000240)=[0x9, 0x56]) 05:06:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e0000000ae1ffff02000700ca5d62a95b41b24fc9f72731d7421fb64b72d6f9eb4c17c413a21233f59a1015a55628bfe4acae"], 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(r0, &(0x7f00000002c0)='memoSry.eventt\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) shmget$private(0x0, 0x4000, 0x804, &(0x7f0000ff9000/0x4000)=nil) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x40, &(0x7f0000000580)={'trans=unix,', {[{@afid={'afid', 0x3d, 0x4}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@nodevmap='nodevmap'}, {@loose='loose'}, {@msize={'msize', 0x3d, 0x8}}, {@version_L='version=9p2000.L'}, {@debug={'debug', 0x3d, 0xbe66}}], [{@dont_hash='dont_hash'}, {@measure='measure'}, {@appraise_type='appraise_type=imasig'}, {@dont_hash='dont_hash'}]}}) 05:06:05 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:05 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x68, 0x0, 0x820, &(0x7f0000000240)) 05:06:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB="6e6f61c16c2c00"]) 05:06:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = creat(&(0x7f00000001c0)='./file1\x00', 0x30) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='fuse\x00', 0x1000, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=r0, @ANYBLOB="2c67726f75705f69643dbce86ec364fbe18c7fe809bef7ca86fe765cbaee14a8c35bc75c79d4299e35bcdd4544a54c8e5cfa729e7c36359ef818a747ccd4549b04452b5c528b6134878a2ae68a7c6790aa4472c9358e33725fa46c4202b7fc3cbe4c91ebbab20ca8b1acfae8c90e44542ec3af2aa77233379a81cd72eb1cc19b5187c6", @ANYRESDEC=r1, @ANYBLOB=',allow_other,max_read=0x0000000000010000,default_permissions,blksize=0x0000000000001400,max_read=0x0000000080000001,allow_other,allow_other,default_permissions,default_permissions,fowner<', @ANYRESDEC=r0, @ANYBLOB="2c6673636f6e746578743d726f6f742c6673757569643d76650000367d777f2d373430772d7f663b612d370035622d7a777f3a3c0037622c7375626a5f747970653d5b626465765b47504c2c00"]) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 05:06:05 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:05 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000280)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000002c0)=0x24) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r1, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r3 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r3, 0x3, r1, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:05 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x4000, 0x0, 0x820, &(0x7f0000000240)) 05:06:05 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x400) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:05 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:05 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0xfffffffffffffffd) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r3 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e23, @empty}}}, &(0x7f0000000340)=0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000380)={0x6d97735c, 0x8200, 0x8, 0x9133, r4}, 0x10) utimes(&(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)={{r1, r2/1000+10000}, {0x0, 0x7530}}) 05:06:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:05 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x2000000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:05 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x100000000, 0x2000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f00000000c0)=0x1f, 0x8) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f61636c2c00b9ae96dc639a5b43ebe9abd694149686170053a30d2ec1b089173933be2c2e81729cb79e23a7ee3f02ebc4873d26001310a85c20f831396ea6374bb0e5839b7c521369b6307cb8599571ee5abfef672b61d6391fa8a4263b257bf51a727a5648e70d63d2c72d978b9f8ea5cedfbb609283612a3525f33fcefd94"]) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000300)=""/247, &(0x7f00000001c0)=0xf7) [ 765.374618] EXT4-fs: 46 callbacks suppressed [ 765.374627] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 765.454143] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 765.510077] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 765.510077] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 765.510077] 05:06:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:05 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x2000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:05 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x400) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@empty, 0xfa, 0x2, 0x1, 0x2, 0x100000001, 0x1}, &(0x7f00000001c0)=0x20) fstat(r0, &(0x7f0000000400)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00']) 05:06:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) r1 = accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="e4539b8882abc6010400000000000011c6100260972a7d26baa31944558d7c852e2f32c4d3afabd29710fde02c0b798321790ade2c4a318f0c20ffa6e61177a81201defd9034cf2ab8220367761b34a9b17dfeb378f7d4ea5020d58f6d19c4f3b2513a9466e0d153e52d6e8e786b1c24697facb18f9ed73fddc56e417da8775e78ed4f3434f513dcea84810587e351c3d782ebdfd776c054539dc2cfafeefa937a7ead7c566f"], 0x200600) r4 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r4, 0x3, r0, 0xb) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000780)={'vcan0\x00', r5}) utime(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x84c, 0x100000000}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) [ 765.572523] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 05:06:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) ioprio_get$pid(0xfffffffffffffffe, r1) 05:06:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:06 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x1f00, 0x0, 0x820, &(0x7f0000000240)) [ 765.710652] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:06:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000280)=0x7e6a, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) [ 765.783314] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:06:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x80, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000280)={0x147, 0x29, 0x1, {0x7fffffff, [{{0x40, 0x0, 0x4}, 0x3f, 0x0, 0x7, './file1'}, {{0x0, 0x4, 0x1}, 0x401, 0x8, 0x7, './file0'}, {{0xe8, 0x3, 0x8}, 0x8001, 0x80, 0x7, './file1'}, {{0x1, 0x0, 0x1}, 0x8, 0x5, 0x7, './file1'}, {{0x18, 0x2, 0x5}, 0x5, 0x5, 0x7, './file1'}, {{0x0, 0x0, 0x7}, 0x1000, 0x80000001, 0x7, './file1'}, {{0x24, 0x4}, 0x81, 0x3, 0x7, './file1'}, {{0x40, 0x2, 0x7}, 0x8f, 0x9, 0xd, './file1/file0'}, {{0x80, 0x1, 0x3}, 0x300000000, 0x2, 0x7, './file1'}, {{0x0, 0x3, 0x5}, 0x7, 0x1, 0x7, './file1'}]}}, 0x147) [ 765.881588] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 765.881588] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 765.881588] 05:06:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) [ 765.985590] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 766.093625] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 766.093625] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 766.093625] [ 766.132608] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 05:06:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:06 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x74000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) pread64(r1, &(0x7f0000000080)=""/4096, 0x20001080, 0x2) r2 = gettid() r3 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={&(0x7f0000000240), 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000100)='./file0\x00') r4 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fstat(r4, &(0x7f0000000340)) semget$private(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001100)='/dev/vcs\x00', 0x0, 0x0) r7 = dup2(r6, r1) tkill(r2, 0x16) ptrace$setopts(0xffffffffffffffff, r3, 0x6, 0x0) r8 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r7, 0xc008ae05, &(0x7f00000014c0)=""/243) r9 = eventfd(0x0) ioctl$KVM_IRQFD(r8, 0x4020ae76, &(0x7f00000000c0)={r9}) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001400)="4688d607f4db7cfb272c3828e60901b59d4b56f8394354a8759bbaa3b21aaf053b2fb015ee869189c3f7988aeb6719e156acf6df04e99ed5b821de93ddf1c8e8ce530ac939b40e993f52e1f85ea265a86cc44094b627971c9ca4ad53473683f32b334d861a10cdf906000000ee5be05b56705cbe8030af48b1a4ffd52928f3a82889481eecf7003d5af3879038c005486c55bb12ce9eb043ebd3e00469e85f8c0dbe") 05:06:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x101000) write$UHID_INPUT(r0, &(0x7f0000000280)={0x8, "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", 0x1000}, 0x1006) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f00000000c0)={@dev, 0x0}, &(0x7f00000001c0)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000012c0)=r1) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000001300)=ANY=[@ANYBLOB="d932f3dc7d6df2649fe4a2b8d2560dce8da1e86c2392bb22bd00000000000000000000"]) 05:06:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:06 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x4c000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280)={0xffffffffffffffff}, 0x113}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000300)={0x4, 0x8, 0xfa00, {r4, 0x100000001}}, 0x10) 05:06:06 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000300)=""/34) r2 = memfd_create(&(0x7f00000000c0)='\x00', 0x6) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @empty, @multicast1}, &(0x7f0000000b00)=0xc) recvfrom$packet(r1, &(0x7f0000000440)=""/80, 0x50, 0x3, &(0x7f0000000b40)={0x11, 0x1a, r3, 0x1, 0x40}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000003c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x1, @mcast1, 0x80}, r4}}, 0x30) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000280)={0x6, "ec7fae1fc1ca683fa7b07ce5f6be510951bb8cce9aa82e0669b7f1d24d700428", 0x2, 0xb807, 0xb09, 0x400000, 0xc}) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000400)={'gre0\x00', 0x4}) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f00000001c0)) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 05:06:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:06 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x2, 0x70, 0x4, 0x800, 0xd1, 0x81, 0x0, 0x81ef, 0x4000c, 0x2, 0x5, 0x3, 0x3e4000, 0x8, 0x1000, 0xe41, 0x8, 0x0, 0x3ff, 0x4a0, 0x7, 0xfff, 0x2, 0x9, 0x8001, 0xd1d3, 0x0, 0xb6c, 0xd9, 0xba93, 0x20, 0x2, 0x8, 0x20, 0x7f, 0x7, 0x40, 0xfffffffffffff801, 0x0, 0x1ff, 0x7, @perf_config_ext={0x2, 0x6}, 0x0, 0x1f, 0x1, 0x3, 0x1, 0x7ff, 0x7fff80000000}) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:07 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x8, 0x0, 0x820, &(0x7f0000000240)) [ 767.002847] kauditd_printk_skb: 30 callbacks suppressed [ 767.002859] audit: type=1804 audit(1544850367.281:1751): pid=15335 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1075/memory.events" dev="sda1" ino=17261 res=1 05:06:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:07 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xffffffffffffffff, 0x0, 0x820, &(0x7f0000000240)) 05:06:07 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000700)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x4000, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x8) r2 = dup(r0) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f00000000c0)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000000)="c1", &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 05:06:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x1, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000004d80)=0xfffffe84) r1 = getpid() sched_setattr(r1, &(0x7f0000000580)={0x30, 0x6, 0x0, 0x2, 0x66, 0xd2d, 0xd866, 0xf48b}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x181800, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000540)={&(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x8, 0x2, 0x6}) sendto$packet(r2, &(0x7f0000000300)="a374c76a5db0c627aa4762f999a98da0ac703f455d626090f9c0f1b43ad4e6e219ec9b5d44b0689a1a53ac63fa12f476d6c7bacc6f2d5c34f230e96b6653df68a0452ba131b496a9fe81bb810ef00894d8303edb454ed4d38ab2afebabc704088697ad4bba292a9521999faea98180fbafce28b8baedc97fe80e37a2180c403789df7757ea34", 0x86, 0x40, &(0x7f0000000280)={0x11, 0x17, r3, 0x1, 0x8, 0x6, @remote}, 0x14) [ 767.120841] audit: type=1804 audit(1544850367.401:1752): pid=15350 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/860/memory.events" dev="sda1" ino=17262 res=1 [ 767.192243] audit: type=1804 audit(1544850367.471:1753): pid=15372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1076/memory.events" dev="sda1" ino=16801 res=1 05:06:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:07 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x2d00000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) bind$bt_hci(r0, &(0x7f00000003c0)={0x1f, 0x0, 0x3}, 0xc) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() r3 = perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r3, 0x0) write$UHID_CREATE(r4, &(0x7f0000000280)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000580)=""/4096, 0x1000, 0x257a, 0x8000, 0x5, 0xf8f, 0x1000}, 0x120) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) [ 767.271602] audit: type=1804 audit(1544850367.541:1754): pid=15345 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/860/memory.events" dev="sda1" ino=17262 res=1 05:06:07 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x40) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) r1 = fcntl$dupfd(r0, 0x406, r0) bind$unix(r1, &(0x7f0000000280)=@file={0x1, './file1\x00'}, 0x6e) 05:06:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:07 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x820, &(0x7f0000000240)) [ 767.412539] audit: type=1800 audit(1544850367.541:1755): pid=15345 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor0" name="memory.events" dev="sda1" ino=17262 res=0 05:06:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) [ 767.479037] audit: type=1804 audit(1544850367.671:1756): pid=15386 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/861/memory.events" dev="sda1" ino=16530 res=1 [ 767.543283] audit: type=1804 audit(1544850367.821:1757): pid=15386 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/861/memory.events" dev="sda1" ino=16530 res=1 05:06:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:08 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xf6ffffff, 0x0, 0x820, &(0x7f0000000240)) 05:06:08 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) fsync(r0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) execve(&(0x7f0000000000)='./file1\x00', &(0x7f0000000400)=[&(0x7f00000000c0)='ext-\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000280)='/!!\x00', &(0x7f0000000300)='%\x00', &(0x7f0000000340)='noacl', &(0x7f0000000380)='\'eth0]cgroup.posix_acl_accessppp1\x00', &(0x7f00000003c0)='ext-\x00'], &(0x7f00000005c0)=[&(0x7f0000000440)='/\x00', &(0x7f0000000480)='selinux\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='ext-\x00', &(0x7f0000000580)='9p\x00']) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB="d0"]) 05:06:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000280)={0xffffffff, 0x1, 0x3, {0x7, @raw_data="08465975e3d90f1bc5cfe728978c22ec8cc6d61fd2d59a340eee2c69af70cf5affe61ffc27254fb8dd7c53fe50a5ea41e1daa349fc2e4bf82ecd93d9c810b829121fa651131a122c47aee02e904d06c3193b30acec94111934bfb32d143082ddac4ec5528de5c44cdfbbaa68c47aec2e3f18bb05fc73405b78ea4eb45757ed30d9afa284aeacf86ed3b3ac359080573a65899260c4cc6e461fad957771a4a6c875f0e05aa17124dfda81fad66f237654532255092c2fa34bf20635cd2dd122a4d4a142c8f823b28b"}}) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="5b41b2"], 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) [ 767.736363] audit: type=1804 audit(1544850368.011:1758): pid=15406 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1076/memory.events" dev="sda1" ino=16801 res=1 05:06:08 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x2d00, 0x0, 0x820, &(0x7f0000000240)) [ 767.848033] audit: type=1804 audit(1544850368.121:1759): pid=15409 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/862/memory.events" dev="sda1" ino=16913 res=1 [ 767.902887] audit: type=1804 audit(1544850368.181:1760): pid=15420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1077/memory.events" dev="sda1" ino=16528 res=1 05:06:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:06:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) r0 = socket(0x5, 0x0, 0x1) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) 05:06:08 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x48, 0x0, 0x820, &(0x7f0000000240)) 05:06:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) keyctl$unlink(0x9, r1, r0) 05:06:08 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000000280)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x161082, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000300)=0xc) stat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000500)='./file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) stat(&(0x7f00000007c0)='./file1\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000880)={0x220, 0x0, 0x7, [{{0x40, 0x1, 0x3, 0x8707, 0x6, 0x200, {0x3, 0x5, 0x80000000, 0x5, 0xffffffffffff0000, 0xfffffffffffffffb, 0x7, 0x9, 0x4, 0x200, 0x9, r3, r4, 0x9, 0x1}}, {0x6, 0xffff, 0x32, 0x80, 'ppp1{selinux)mime_typeposix_acl_accessself&keyring'}}, {{0x2, 0x1, 0xffffffffffffffff, 0x8fae, 0x9, 0x942, {0x0, 0x6, 0x7566, 0x4b86, 0x0, 0x6, 0x1, 0x0, 0x0, 0xfffffffffffff801, 0x8, r5, r6, 0x4, 0x7}}, {0x1, 0x6, 0x2, 0x6, '/\x00'}}, {{0x3, 0x3, 0x41, 0x1, 0x1, 0x8, {0x6, 0x4, 0x5, 0xffffffffffffff80, 0x7, 0x1000, 0x7, 0x115980e0, 0xff, 0x5b, 0x4, r7, r8, 0x2e, 0x3}}, {0x5, 0x9, 0x5, 0x4, 'noacl'}}]}, 0x220) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) r9 = accept(r1, &(0x7f0000000400)=@tipc=@id, &(0x7f00000001c0)=0xfffffd4f) getpeername$unix(r9, &(0x7f0000000380)=@abs, &(0x7f00000000c0)=0x6e) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, 0x0, r0) 05:06:08 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x1000000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fstat(r0, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{}, {0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f00000002c0)={r2, 0x3}) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) r3 = fcntl$dupfd(r0, 0x406, r0) ioctl$VIDIOC_G_MODULATOR(r3, 0xc0445636, &(0x7f0000000080)={0x20, "ecdf81b2c51b321bbbf7b4d1bdb4885c1da53528eb78c4de70465f22dc00c847", 0x208, 0x5, 0x5648, 0x0, 0x7}) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) 05:06:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x10000, 0x800) accept4$inet6(r0, 0x0, &(0x7f0000000280), 0x80000) mount$9p_xen(&(0x7f0000000240)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000001c0)='9p\x00', 0x20, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f61636c2c87336ecab8ce18"]) 05:06:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0e0000000a00f7ff0300cad1240100000000ca"], 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r3, 0x20, 0x70bd26, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:08 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x1f000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, 0x0) 05:06:09 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x3ff) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x50000, 0x0) linkat(r1, &(0x7f00000000c0)='./file1\x00', r2, &(0x7f0000000280)='./file1\x00', 0x400) close(r2) 05:06:09 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) close(r0) rt_sigpending(0x0, 0x0) socket$unix(0x1, 0x1, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x8) 05:06:09 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000001c0)=0x6, 0x4) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x140) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000700)=@assoc_id=0x0, &(0x7f0000000740)=0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000780)={0x5, 0x2, 0x8, 0x7, 0x5, 0x6a, 0x7, 0x8, r3}, &(0x7f00000007c0)=0x20) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) write$binfmt_script(r0, &(0x7f0000000300)={'#! ', './file1', [{}, {0x20, 'noacl'}, {0x20, '9p\x00'}, {0x20, '9p\x00'}, {0x20, 'noacl'}, {0x20, 'user,ppp1/'}, {0x20, '9p\x00'}], 0xa, "06ae41cd6dad64101c5165a4f682117c3ffd5aed43a896f8ff8cb66f743ce5f7f7cfd6e79bb885d952d8eef06d82bc04da175dd7c0853f06533739dce15a0b7819b6a4933cc891700c2e979d6328cb6c7cf7653e7f26cc6816cc3384d62414ce0564a9c49b4c20c61e7fbef8fc87b6ff80c04b1ac06fbb45ffb6e32aa205ea1adfce6674ed550a25102f9bbc667198f09bc307184d1fe8264e2eae766a319e310d1f8ea61d5815c1b7652c971f6097bb0572bf742a4da102329d5ffbf09feb1db1370109f73d"}, 0xf5) recvmsg(r1, &(0x7f0000000600)={&(0x7f0000000400)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000480)=""/160, 0xfffffffffffffe75}], 0x1, &(0x7f0000000540)=""/130, 0x82}, 0x40000023) linkat(r1, &(0x7f0000000640)='./file1\x00', r1, &(0x7f0000000680)='./file1\x00', 0x1000) 05:06:09 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x8cffffff00000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events)', 0x3000, 0x500001c) 05:06:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000180)={{0x866e, 0x100000000}, {0x6, 0x3}, 0x8, 0x1, 0xded}) 05:06:09 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000040)=0x6, 0x4) memfd_create(0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 05:06:09 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x68000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000000)=0xffffffffffffff2f) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB="00b52b00cd0000"]) 05:06:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000280)="2d24e16fc44d92beb1f67069299606f203be6e34812e0fd5720836c3276a578e6fa483d7e5aa1cc6ea76805191301dea771e27a4a4c35c006cb2386fc9bf583c8680bbdaf68e09369f7687d220bc45f917aa17c4d0364bebc9392f62d0d15999a4bb890579e7be169f076c202d7601acbee280e6f6160c96b29806df12ccec", 0x7f) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000000600)={0x8, "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", 0x1000}, 0x1006) ftruncate(r2, 0xe56) 05:06:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) creat(&(0x7f0000000000)='./file1\x00', 0x95) 05:06:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.eventsH', 0x3000, 0x500001c) 05:06:09 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xc0000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:09 executing program 1: r0 = inotify_init1(0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = gettid() ptrace$peekuser(0x3, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) clock_nanosleep(0x0, 0x0, 0x0, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) 05:06:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) semget$private(0x0, 0x1, 0x201) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='./file1\x00') fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00']) 05:06:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events"', 0x3000, 0x500001c) 05:06:10 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x7000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x80, 0x0}}], 0x1, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@in={0x2, 0x4e21, @local}, 0x80, 0x0}, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 05:06:10 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x6c00, 0x0, 0x820, &(0x7f0000000240)) 05:06:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000280)={0x0, 0x0, 0x9c0, 0x4, 0x70f4}) 05:06:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000300)=""/239, &(0x7f00000000c0)=0xef) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f00000001c0)={0xa, 0x9}, 0xa) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) socket$can_raw(0x1d, 0x3, 0x1) 05:06:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)="6d656d6f72792e6576656e747303", 0x3000, 0x500001c) 05:06:10 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x74, 0x0, 0x820, &(0x7f0000000240)) 05:06:10 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000300)="48938ff084e700d049d028114e5ad494c4d1ffc5f1a20e3b89cb47d93b6e84011a038bba921e5599edb4754b9d0f7f490bbcde8379f3ed0b8545b58a0c2c3802b7389ad9075c02bad62ae573b970b2b6074cf88569616b779a979450fc16a2d93f62178b88e8739c581346dc7326e14edb92310f2e6fb26c1404300a809db757c7ccd64c1001b40a05cdac10801700dd118d48c0b508a42440553ae410c07f3e15a6354159375c267f2ef3c8accca576760f2c63fdce77fbe1", 0xb9}, {&(0x7f00000003c0)="3e347bfb647f6af5d4bb92e646a5350a9804019615f9d8b6e7ee9d42aef65a15a2c5e8e08b6dfe4144f249b1897e6e6deb8434b834e18f880600253401de2864f156aa4e34cb2375c95204a040d450647cd0", 0x52}, {&(0x7f0000000440)="3e65ee34b588dae1501443f8d1d82978fb4258d858b8a1d0fd8169ad95871dbb7a8e7753f2d78d3212c18267d5cd8d464a060594ed7faafabfb7312eda457edba0cc68ea1452f81bf81a85fd3fb19e7c8a2fa423ed5d65e11d9c7c61bce7d3765d5d2f908f592ac001fbb7735f6b108c5a623ef79845927968746dca20622a9d6fa163737f0a48f25d8d4b05b311738b3be71c6c74992e9fe831a710f9162a2e7484de99e202e0f2c2f48b92f0a8532a00e2e173579731d217c3ab4defea4ed73b4488bf76b5a626df20e010902ed1155eaf4c3380fb48b772", 0xd9}], 0x3, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file1\x00', 0x101000, 0x80) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0xff, 0x1, 0x527c, 0x4, 0x0, 0xffff, 0x1, 0xd, 0x81, 0xffffffff, 0x0, 0x2, 0x9, 0x100000001, 0xbc3a, 0x7, 0x6, 0x1, 0x3, 0x0, 0x2040, 0x8, 0x7ff, 0x6ca, 0x6, 0x3, 0x0, 0x1ff, 0xffff, 0x7, 0xffffffffffffffc1, 0x0, 0x3, 0xfffffffffffffbff, 0x200, 0x4, 0x0, 0x268, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x4400, 0xce, 0x0, 0x4, 0x5, 0x7, 0x800}, r1, 0xe, 0xffffffffffffff9c, 0xb) 05:06:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2, 0x0) accept4$bt_l2cap(r0, 0x0, &(0x7f00000000c0), 0x80800) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:10 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x300000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:10 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) r2 = syz_open_dev$amidi(&(0x7f0000000380)='/dev/amidi#\x00', 0x2, 0x109206) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x8591, 0x8000}, &(0x7f00000003c0)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000400)={0x8001, 0x209, 0x4, 0xc31b, r3}, 0x10) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x200000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap='mmap'}, {@cache_loose='cache=loose'}, {@aname={'aname'}}, {@nodevmap='nodevmap'}, {@dfltuid={'dfltuid', 0x3d, r1}}, {@access_any='access=any'}, {@cache_fscache='cache=fscache'}], [{@measure='measure'}]}}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)=ANY=[@ANYBLOB='@']) [ 770.440318] EXT4-fs: 34 callbacks suppressed [ 770.440634] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 770.440634] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 770.440634] [ 770.464220] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 770.548804] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 770.548804] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 770.548804] [ 770.580790] 9pnet: Insufficient options for proto=fd [ 770.616532] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 770.637508] EXT4-fs (sda1): Unrecognized mount option "@" or missing value [ 770.750359] 9pnet: Insufficient options for proto=fd [ 770.784550] EXT4-fs (sda1): Unrecognized mount option "@" or missing value 05:06:11 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x100000000, 0x2000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f00000000c0)=0x1f, 0x8) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f61636c2c00b9ae96dc639a5b43ebe9abd694149686170053a30d2ec1b089173933be2c2e81729cb79e23a7ee3f02ebc4873d26001310a85c20f831396ea6374bb0e5839b7c521369b6307cb8599571ee5abfef672b61d6391fa8a4263b257bf51a727a5648e70d63d2c72d978b9f8ea5cedfbb609283612a3525f33fcefd94"]) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000300)=""/247, &(0x7f00000001c0)=0xf7) 05:06:11 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x1000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:11 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) fcntl$getown(r0, 0x9) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0e0000000a00000003000700ca5d62a95b41b2b6c2cb0a6ccbe5b7e4d68af16775d4ed15ec6bb7bd88d022ea6772644b8cce6a829769db83743420fa6f745b1901bd2da4f4ec11546717656850b546fab7378263aa427385927712f156933f28479670c1f9e41296a09d9149a52e404b96259b040a6b534338b2cbc1eae605c1a41a9b9c49270899c19f657c9c0d3347b4041bad0a72a776e0e8fb67ca1d774a8e053edb10fb349d14b78609195a84ebaeb81c5546c79bec33e88da8f8d8a811d6f96526f9e61bf6e1ea8e5858e8"], 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000300)=ANY=[@ANYBLOB="9f44490447b11aae8755897481ba75d2efa109006e3f5f5d1f6555d7a43c9ef25691efa6e8c9ccfc0e6ec09e142b14be15d179a8e19e2b15f4e37d06d8c6c6ebdd87023ab7571236c6cf3e4a715615a5c616406d8084d6b52de185b95dc56b171824111ddc297a004026eda585b37fe6b8320c45618c240465524d2294642fc4eee86257eeca9fde680d"]) lsetxattr$security_evm(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f00000001c0)=@sha1={0x1, "b8b56e9481eec1d47072c9b08f9d8a9061215cdf"}, 0x15, 0x1) 05:06:11 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x600, 0x0, 0x820, &(0x7f0000000240)) [ 771.029545] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 771.029545] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 771.029545] [ 771.048158] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 771.120856] EXT4-fs (sda1): Unrecognized mount option "ŸDIG±®‡U‰tºuÒï¡ " or missing value 05:06:11 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x700, 0x0, 0x820, &(0x7f0000000240)) 05:06:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x101840, 0x0) stat(&(0x7f0000000480)='./file1/file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r0, &(0x7f0000000280)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x7fff, 0x6}, {0xa03, 0xb1e}], r1}, 0x18, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xffffffffffffffff, 0x4000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, &(0x7f0000000000)=0xfd86) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 771.219911] EXT4-fs (sda1): Unrecognized mount option "ŸDIG±®‡U‰tºuÒï¡ " or missing value 05:06:11 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x100000000, 0x2000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f00000000c0)=0x1f, 0x8) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f61636c2c00b9ae96dc639a5b43ebe9abd694149686170053a30d2ec1b089173933be2c2e81729cb79e23a7ee3f02ebc4873d26001310a85c20f831396ea6374bb0e5839b7c521369b6307cb8599571ee5abfef672b61d6391fa8a4263b257bf51a727a5648e70d63d2c72d978b9f8ea5cedfbb609283612a3525f33fcefd94"]) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000300)=""/247, &(0x7f00000001c0)=0xf7) 05:06:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 05:06:11 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="006d060200000000"], 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000580)=@security={'security\x00', 0xe, 0x4, 0x470, 0x178, 0x268, 0x178, 0x178, 0x178, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x4, &(0x7f0000000280), {[{{@ipv6={@dev={0xfe, 0x80, [], 0xa}, @dev={0xfe, 0x80, [], 0xe}, [0xffffffff, 0xffffffff, 0xff, 0xffffff00], [0xff, 0xffffffff, 0x0, 0xff000000], 'ip6tnl0\x00', 'teql0\x00', {}, {}, 0x32, 0x2, 0x4, 0x8}, 0x0, 0x138, 0x178, 0x0, {}, [@common=@hbh={0x48, 'hbh\x00', 0x0, {0xffffffffffffa7cf, 0x0, 0x1, [0x58440371, 0x100000000, 0x7f, 0x9, 0x7fff, 0x1, 0x1, 0x2, 0x10000, 0xfffffffffffffff8, 0x2, 0xffff, 0x9, 0x5, 0x7, 0x6], 0x6}}, @common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x12, 0x0, 0x7fff}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "ea2a23dc39ff8f0eee09bde3b1ffe7dd67c2ab8eaee5694e10e8333166ab"}}, {{@ipv6={@loopback, @empty, [0xff, 0xff, 0xff000000, 0xffffff00], [0xffffff00, 0xffffff00], 'irlan0\x00', 'veth0_to_bond\x00', {0xff}, {}, 0x73, 0x9, 0x1, 0x1}, 0x0, 0xc8, 0xf0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x9, 0x5, 0x1}, {0x7f, 0x5, 0xb0}}}}, {{@ipv6={@mcast2, @dev={0xfe, 0x80, [], 0xf}, [0xff, 0x0, 0xffffffff, 0xffffff00], [0x0, 0xffffffff, 0xffffffff, 0xff], 'ip6gre0\x00', 'tunl0\x00', {0xff}, {0xff}, 0x1, 0x8, 0x4, 0xe}, 0x0, 0x110, 0x138, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x1, 0x4, 0x1, [0x1, 0x80, 0x40, 0x4, 0x5, 0x100000001, 0x91, 0x80, 0x7ff, 0xa0000000000000, 0xfffffffffffffffa, 0x7fff, 0x21, 0x3, 0x7, 0x2], 0xa}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0xfffffffffffffffb, 0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:11 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x1000000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000400)=""/248, 0xf8, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) r0 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0xb8, r1, 0x916, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x11}}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x18000000000000}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1000}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffffffff24e7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x8090}, 0x4000) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:11 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', '/\x00'}, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={0x0, 0x0, 0x1, 0x91, 0x10000, 0x5, 0x1, 0x7f, {0x0, @in={{0x2, 0x4e20, @loopback}}, 0x6, 0x8, 0x3, 0x15a4cb4d, 0x2}}, &(0x7f00000001c0)=0xb0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000340)={r1, @in={{0x2, 0x4e23, @remote}}}, 0x84) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 05:06:12 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xffffff8c, 0x0, 0x820, &(0x7f0000000240)) 05:06:12 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x100000000, 0x2000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f00000000c0)=0x1f, 0x8) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000400)=ANY=[@ANYBLOB="6e6f61636c2c00b9ae96dc639a5b43ebe9abd694149686170053a30d2ec1b089173933be2c2e81729cb79e23a7ee3f02ebc4873d26001310a85c20f831396ea6374bb0e5839b7c521369b6307cb8599571ee5abfef672b61d6391fa8a4263b257bf51a727a5648e70d63d2c72d978b9f8ea5cedfbb609283612a3525f33fcefd94"]) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000300)=""/247, &(0x7f00000001c0)=0xf7) 05:06:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f00000000c0)=@fragment={0xc, 0x0, 0x4, 0x44, 0x0, 0xa1, 0x67}, 0x8) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x274428, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:12 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) r1 = dup3(r0, r0, 0x80000) accept(0xffffffffffffffff, &(0x7f00000006c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000740)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000780)={'vcan0\x00', r2}) [ 772.105195] kauditd_printk_skb: 22 callbacks suppressed [ 772.105221] audit: type=1804 audit(1544850372.381:1783): pid=15670 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1085/memory.events" dev="sda1" ino=16526 res=1 05:06:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x48800, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f00000001c0)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) execve(&(0x7f0000000000)='./file1\x00', &(0x7f0000000380)=[&(0x7f0000000280)='\x00', &(0x7f0000000300)='noacl', &(0x7f0000000340)='/!\x00'], &(0x7f0000000500)=[&(0x7f00000003c0)='/\x00', &(0x7f0000000400)='{lo,\x00', &(0x7f0000000440)='/\x00', &(0x7f0000000480)='9p\x00', &(0x7f00000004c0)='9p\x00']) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:12 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x7400000000000000, 0x0, 0x820, &(0x7f0000000240)) [ 772.298795] audit: type=1804 audit(1544850372.531:1784): pid=15678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/867/memory.events" dev="sda1" ino=16705 res=1 05:06:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0e0000000a5d62a95b41b2"], 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000380)={0x10, 0x30, 0xfa00, {&(0x7f0000000280), 0x4, {0xa, 0x4e20, 0x1ff, @empty, 0xffffffff}, r2}}, 0x38) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r3 = gettid() ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000003c0)={0x2, 0x100}) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r3, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuset.effective_cpus\x00', 0x3000, 0x500001c) 05:06:12 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xffffffff00000000, 0x0, 0x820, &(0x7f0000000240)) [ 772.342918] audit: type=1804 audit(1544850372.571:1785): pid=15678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/867/memory.events" dev="sda1" ino=16705 res=1 05:06:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f0000000300)=0x1c, 0x80800) socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x20, 0x5218c0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f00000000c0)=0xffffffffffffff7d) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000000)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f00000001c0)=ANY=[@ANYBLOB="cad2aefdfcd21c3965747c5985c8e2ca9366b6714af2dacf65bca6563034d0cc93f4f6a6257143110b0e309df0815d235d48b543ef3127c1bb7cc29af9cead976eb7a6f08f4185da512bc6635de872c723c7a9894eabb34f28768344ebabaeddbaf35bd23b85519e36c08e71374bd5d79d6b2e6c2bf35d23fbe3ea77b5"]) 05:06:12 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f00000000c0)={0x45a, "6e92694c81ef1fa2ae3899e4f53da059e4c662f3106f1567c16cf7473a9c7fa8", 0x3}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000300)=ANY=[]) [ 772.444492] audit: type=1804 audit(1544850372.611:1786): pid=15684 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1086/memory.events" dev="sda1" ino=16738 res=1 05:06:12 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0xc0002) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x48260202}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x2c, r2, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}]}]}, 0x2c}}, 0x40000) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000380)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002540)={{{@in6=@ipv4={[], [], @remote}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@loopback}}, &(0x7f0000002640)=0xe8) syz_mount_image$f2fs(&(0x7f00000003c0)='f2fs\x00', &(0x7f0000000400)='./file1\x00', 0x3, 0x3, &(0x7f00000024c0)=[{&(0x7f0000000440)="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", 0x1000, 0xfffffffffffffff8}, {&(0x7f0000001440)="1e71edf7048ff1000768e0b1e04c3c1742da62fe0ec2637423e1a0da3d9e147a409ca6174655338a3d4515b2d05c047dee39a6c0efc2c6cbc6aed3570361654499f0b7e68ccdd024c20f1beebfe4dcf0c7e63b77cb948d833a9080659413f1d7f5b736d394c0eee5584eb7b290e2c902644a4569762826d67812132e469b04f41e0343828ff9d4952e0b674c431885ea2815363be3f86b905769809110c613d8cc33ba12f94e103f2308636707394f5a73adcafe95087b5718387656cdf375a4e7d136b95c18e5acbcee3ddfd436a1b29680cf588be803f157f0b1d6099479375858efcc3fc7b9973cec879385189ed62b8a65f7ab0a204e5dcf4fd674179d823c1a882f1ea42b120fd862a9bd864a688563c953f4c6c9ff5c530d1b0e530282ae785004468a162aa10855683bae0443fee9b7a9bb32826d5aa4fceb9c9c798b6ccc57775802fbe059357dd0237e93a5b8aa5934f52a89eacedda071345d4839703b26e7b0cd572abf12c368ea5a13595019cb4ab1b482f6a9584042bdb9f3c195bc30460601890cc5e06c6220bbe9dfb9bddef4b88759c6c228981e3e3607e434fa53ad3e9f559fee2132bf438d348f41cf6b8afc41eb9e84c1cb9af4fc4e956473fe6fd150fc138dc9a987fdc6dac46109dd2d8234531132156b26ad40e12bca663eeca772727df65903272e8bdcca472c809faf5cff11855c246b9b8488ba72a68ba7e345721e83229dce7628a089f2ef52607616d7819a08d4e1053291baaf89473fe0ff2258e5d3a4b97acf8cd4b97a93ba32e4fcd7f2176ca9c282e2e8d20cee88dd3ea356af2e8415669556d2aeaf05f7393aee497421a26a1187b7b216a6a25ec3e72b9152ae8f81bd70748b13d23935a914417b0b5fed0007ffd553f5f731119fe43fbf3cbe0a109fc236e1fb3c7d1f09cccc4fbb983770c486ff83cf71a36ac288ac1cd6dd1758031a27cfcb6f711f41cb228f306f87c7d23565294677a2004bea2744ec3c735b7cbdffb3e0aadd7597f7267526a0f8ef2302baf9c7a48b6c2657ca811c9961ae3e332b094100a221e41303c9e677eb13ed4163a8fd013e7aeec09c221ae8c32ca4eadefb673da520b05f9d8b56fa786bc1eccc875a28a9af785cc2936fd7e7a817a7e5283b7fe1d328e3f17a4997a9ae4df306e52ca846d382eb7b39c47aaaf2c260590d7238049a93fe8c0026ff05f92d041793ed37de239b644cfd22d6ca60f15bf03c15e0fa96248de687e460ca9dd4c0f3230364d780bfc03ee38360c728af0c42d33cada0ed442252996438aaa7ac194da2ae53b3d52205ad258539695bef582bb72e29a699954b727bf9764e4bb54b53970af15722ec98f5e2a2f3d87121e68eb64311c254b4cde1d09d2d7f3015707f956f10f0e3762104ec55920318aa0ce174b6a69944f4801e8daab4b8a0e546185f0494ade0c139b2f1eb19362ea022d1a577698c3bbbda5e20e3e583b729f280426f66ac7670ad722b54ff8176319cb12e9037552ce4cc6df4a9dbfd94e9f8d2af8e7a6b88469a60e7d34dbed83929be4d11ad47f52f81fd0095e9e546764a1acbb4fddfe8e0051c0f22c4cd7b22cd8d09834097543973e6e606f6b8d09383169fc65d20da9646e6cb5a8819446c6194ac9d961e0964bc9831faef0a8aab91f414e02b357e2be77902c8e94e103d03ecfc52b34aed0f104f214727a47ae3a60a425ed0886980c0ddc52989f70cbc2ad76769442601362e1301418ff4df71f73984ad74236138f48d1d8ea83d1ef34b527ad1ec30fab04371bf848d02c79eaa90b1e65a115ccda19cf46ac20cbbba0c15e3cf75b3eface4c9e26072e00963064c171d1a69d725e31e4b5d5641007528a661ed4cdb446e972298cc4defa478eb9579d31ca47c84ae4d898d0b8a3cc7140214b0319b4f9c4964475ebe60ac199dd1bc4f502835b6cba418e958158930544582095a1e90477e91730a9b2f8f68ee55e7322cef10b1fb0756beed9fcf7778ab511ea83149be87c12f63043767387346c155e369a1f5dff55caba5e1ccea059f674ce4c5c87cb8e89f02cde37b145497d93330d7e6515c0e71f8118895d6d3e220225867adf76748c126f426cccdaf4ddacb41c4e6c17412976209b8a3ecb3ca76324d6167848b8ef2563850ea3740ee00cd85c252ff5d69f6f8eee8f21fc962bedb8cf3a7a7401c966ab90ec1070ea41fd52798a087a2c66bd639e402eff2bc8f29df6e1ea507b3bb79dc875670f5bd1571dd3052657284772bcf659ab15a604c1f6d6199fca23bf83d46ab6f83e07407a85d125d894e3b506094ed01ceea424925db8be31015ec87fd6c103e7cb197b5e8b6d08f3ebaa9e5738b11602c191de61f8858d3dc1ef0b031bc8289c84a273acb8a3177e31f6e947d22dd7090f7c1576f9dd99923f3e08b4690eb581705d154642ccda6ce98c80a63d0490548a25e1a19cb85115938431468b0e11b18ec72a87e4333fef4dd33a34a3f38932d625bea71ea4a28a259a60c876c936435e0c8aaa167cb8d4ffd8e56dba4498dee233d40b31872d2624e7fb01e9c68cb982a0bc08f64f574678505461f62c6caebde760d64fb28cece9ba307fbca1855f9297769044c41a71333244264b7fa7aa2c26f8f02a1d8e095d63208042e970444410b46a631c92e3a9896a6bb4a01667c98c3447d5c4cbf4153319cc2419e50071b025f648fb3b1c72e6049de3f6c866722128402c4fa3f276152763262308a4cc292f102c304dc822aa87dbcbcf94a9dcb5ed76b67dacdc14866cd53ddcef70e62b310a897d38f64c70bcae45c191cac5d87daae82bd14245f0bd2a6925fb1f39d8a914709db370c608e020208805993c33d9150af8cf185b50d96a881a771077323b0ceda8c400898b651b269397e69d447158f67304845379d9024be1f5ee286fd71718bffc42f71c078c1a6313e9e7a4b2e19f711eddbb0462c3a452e937a39b8414e28e2ea43e0330510b46d0508c39fa9b765b3c533a1257a7ab4a132bb91c33d14c4f4d73efecc2af6ed20b7cea600e7d299d8716e572e0160c90c087420b8986b15fcd46107bf07d5a7438e43c3aa2b3fd3ad59b87aeada256695dd7b25388462321660b2abd87e4598fce1e4ac0eb25e645d017fbe22e6c4672c7c2a12d307357ec4631bfd98c76240df9de250acd9ec337be3a4514e0936f49b96ce441270907f11fccecd457e5db8f38cca1184a919a0ddb755fd11c0be849149a4bbfe081b81277010f44a8ab885f23768c8cb934da873af33e923fde29ec150843a29ac425c0dffe00d4200606dc3670040a1173cf79c59fc72852829a3c14a2a1123c9724cf505ca0f53916c73d95cf6d524292c99518444e9edba72a418a2e6d16e411183f303c3c1f8011fc4429056f9d2775686975625bdafebc75fb8b8e1da67904bc80d40f6749d4d632694f8e7ea2e1c9494e4ca70050ebbd1eefd3cb7ba2caf77807ac08cdcbc4e9120e138a0ebb43a263a13ab37e5b4ddacdd9d4123f0f2b4e4279297991565de30c5cda814ed575063823d05b74c995b080091e6b8e4b01068a0e44211059a2d48a37a02b8e0c914348bbf395d214378e18d423f4e5d02866d1e7d60e1fe7acd7cb7ce2f1502936970f54ee9b877c29d68877c009a1cd9732a2038d8763fb30759fbbb6ead0b14d72fff71315fecdfe893c01eb7058ad2e920172ea9b98a748730a9fd540e68a27479fe3d7bbbd8a5fb1213e5e1cf1a86f304b8da591dfa3ba024ab2381772ee6fea942cb383a60521cc03e222417536a4302554bc6c8e5357191f99e57332c0880885db5e9f03da0d79392ba0e319f2c7d44767e28aba30b1f6f3ff306005764e4152b45ad62b257370333539dc96329c8ff1a1252aa040fabcbcc946be724d8c54dbc9800eec816c5a83dce42c9cd86c2665f579f0c77536f024c8ed4aa630fefe316f99cbdfce0c093de80f627f0652b474aeb71e4369f8911de6f27ec5c1060ebca1ffc1f04e43e35a833f941e80ac8e734596ae6513e24de47245e5146f5c6a7a503dd2ac548eafcf49189b2bf7ca55741fc3fffa46b3ca1874de9c98934ec89fecf84a6cb4a320cc1f3a1100c71bef6a16f4e7005635e80054b4daa9aadd49b78670d4240f71d3fe5fba7bca0da285ab641ac457c61b28984a62365b86aa63a9eae47384d0e5e145243c86856f67bcc7e6380f844ce0c4b6defb0e456c9591795fbc211995e7ec487e2dad76f997567082e096f5bb376fc45c3a9969bdb7f4f9671371059efd70a838475454eb4238d5bfd8f758c167aec3c35b52df8e91a564a2ac7a51b32255d0089468fd712876f5ed785797a4b71e1751621e1dc2a8b665bf6235798144b66ae1f9217de11f4887d62b91184e21504035148e798396d4b253a11b77fac47256f2edd4202575d668be815e3c5f2918d76f74a6a7cd4b130167a5961431d4dcae3c69b47cb10a20a065fb0822199c6eadbf009a4a376e1b4448a27c532a3cbe5fc06e569840ed8f5d351dd4df6475119fa53a9b3d1780a28cce8a0982465f573a83cabae37a18bbe684768d1add53e0812a751310aca6f7a0afa1e599e3fe120304ebecb6b49ce11f1ef18bd4d398229e7095908bd6d42b83240696ac17773b51f6adbfc00dfddd59a5d391d46ca80d0a9dab7a24ecf3d814345eecc1563aa0da74b675559762e90d572d66bb03ba1645106899df3bb28b2b50c3a38d1b14ea43412e0850aa52aa578ada0276644df17fb1907b6efa45fb1217e5182274a8a52d2451a166d5b9fcda2c446880aeeaf93b344d84052f13b745f28a511c386866f0e6d1f3acfa81cfb1c885e8f00cd2e2b390ab2f8572cfb6d2a027eb5665fce6f1ed432f2ae6c5d150daf7078035781130a5b572c5f4ab57ef8b07ba396e04346ab8406692f77d04b240ce8450461067cc0910535e3232b898eedee341ce0e100fcb4b75ea2c9c111e9596a23bcfdc0e66b7df859783fe44779ff3259b56b7867258ec6fae3e6c8f9fade85e5cb7401f85b42d09367a7197c84e296872ba5dfd31472430e98c99bbbe4c33d329a22af17fc572fbd1fb38dc48c97846fc92fff29462bddf836692230e1bf7b95eb48ae9468dea87b608af4c117b0bdfa163e4e639c705f566b1331bbaeb0f3de98a237c787887313ff87b2e9f76a6962ba304caf1cfad3af53d961994be5a2205c3467fb862f4efb655b0e77f23fdff7a34c34dc4bcb2291094cb579cfe41403977b64d1c067bbcb2b1cb783501f66f0254b7cf141e79d5a83bdb141660e934195276dba3df6ef823de0a7e7c57d6d2c62512bea435cd8d146852e31e83e6f0fcde3cabcf005585ad4837d059b101e9dc788e2bced50e77c685034b898574c28a0068573bbce429773ed0f94e29b77aa4bc1e7a93407f10835f26682c4edb4435c6aadf27a65a34ed90843a6b6031cdc717c42df66bb229b06edc47fb4a454d1a94c58e732a0339b66792155714a293d0c5ffdcdff43dba95b3e608f1e50ce04c4970ef73e5413ad25a89474009d7d094142afde12eeddcd892e18875ccdd51a9d5c949eb5a697c66b7b8b17a6851d74d1abd89c0e66b459a0900187259267463b82632ff65281123569fdd6f721663c4e22ce3717db7d2827cae95a4796a771dfd5de30351927f04cbf31106a0c1f56c71c977c275c30bf2a5adcc470240d6df9917c65f5f55430fe41f2593467f3d56f9b52e99123f707c632998bb50b8922f4489bed18457d46c71dce2d6914fae208e44c30f8c237710e4338", 0x1000, 0x7}, {&(0x7f0000002440)="3da83b393dd52b607cf46fb221d0233e6aaaa632c445179a192cff2127d9d93162ae5d5e149bdaea343e7fe6fd0a3d21b47d76f89b16812e721b33f630f4b10d575810cfd7425175bbe471b4d7faa9a46a23", 0x52, 0x5}], 0x8, &(0x7f0000002680)={[{@nodiscard='nodiscard'}, {@two_active_logs='active_logs=2'}], [{@fowner_gt={'fowner>', r3}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@measure='measure'}]}) syz_mount_image$ext4(&(0x7f0000000100)="65f8742d00", &(0x7f0000000140)='./file1\x00', 0x40, 0x0, 0x0, 0x40000820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:12 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xf5ffffff00000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000000)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0x8) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f0000000380)='cpuacct.stat\x00', 0x3000, 0x500001c) 05:06:12 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0xf83f0000000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x600, 0x0) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x40400) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000004d80)=0xa90436b4fefdaf0a) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 772.695037] F2FS-fs (loop1): Invalid SB checksum offset: 699892709 [ 772.713107] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 772.723237] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 772.732052] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 05:06:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="3bfd22d9cd222dbd1b000700ca5d62a95b41b2ae2abc4d575b570987a12fe6028bbc91a547b429e41a1ffab2986cd2ccc976ec6a4cba4a0cb416c2ddef8c52ee6bf2c5e406277af9b7a7d75f9fb61b00ca85db46f80ac5308a8422eedaf064ee0b0df7cf32d7bbde41e6d108674a7ceed876024c1117e0430d68f0546350d02ba932efd60f16eb11ae2aae684809a5be45dc97b5906f2b7cb5d19d7de167508d1750a4bedbb2dc49d2861e3e806c83c9b5f2a34ef70fad728db55f17b833932ac5fdcca3f720f4ec5b"], 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) r1 = perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) timerfd_gettime(r0, &(0x7f0000000380)) fcntl$setsig(r1, 0xa, 0x1b) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) getresgid(&(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="00620000aba53421"], 0x200600) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000280), &(0x7f00000002c0)=0xb) r3 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r3, 0x3, r0, 0xb) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f00000003c0)='cpuset\x00', 0x800) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r4, 0x5385, &(0x7f00000004c0)=ANY=[]) ioctl$KDENABIO(r4, 0x4b36) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) [ 772.744748] F2FS-fs (loop1): Invalid SB checksum offset: 699892709 [ 772.751774] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 772.760630] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 772.768355] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 772.886444] audit: type=1804 audit(1544850373.161:1787): pid=15722 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/870/memory.events" dev="sda1" ino=16833 res=1 [ 772.940253] audit: type=1804 audit(1544850373.201:1788): pid=15724 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1086/memory.events" dev="sda1" ino=16738 res=1 05:06:13 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x3) 05:06:13 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x600000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:13 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0xc0002) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x48260202}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x2c, r2, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}]}]}, 0x2c}}, 0x40000) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000380)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002540)={{{@in6=@ipv4={[], [], @remote}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@loopback}}, &(0x7f0000002640)=0xe8) syz_mount_image$f2fs(&(0x7f00000003c0)='f2fs\x00', &(0x7f0000000400)='./file1\x00', 0x3, 0x3, &(0x7f00000024c0)=[{&(0x7f0000000440)="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", 0x1000, 0xfffffffffffffff8}, {&(0x7f0000001440)="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", 0x1000, 0x7}, {&(0x7f0000002440)="3da83b393dd52b607cf46fb221d0233e6aaaa632c445179a192cff2127d9d93162ae5d5e149bdaea343e7fe6fd0a3d21b47d76f89b16812e721b33f630f4b10d575810cfd7425175bbe471b4d7faa9a46a23", 0x52, 0x5}], 0x8, &(0x7f0000002680)={[{@nodiscard='nodiscard'}, {@two_active_logs='active_logs=2'}], [{@fowner_gt={'fowner>', r3}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@measure='measure'}]}) syz_mount_image$ext4(&(0x7f0000000100)="65f8742d00", &(0x7f0000000140)='./file1\x00', 0x40, 0x0, 0x0, 0x40000820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000000)='./file1\x00', 0x280, 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:13 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x2d000000, 0x0, 0x820, &(0x7f0000000240)) [ 773.107707] F2FS-fs (loop1): Invalid SB checksum offset: 699892709 [ 773.119863] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 05:06:13 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x2, &(0x7f00000000c0)=0x0) r2 = syz_open_dev$amidi(&(0x7f00000018c0)='/dev/amidi#\x00', 0x8, 0x10200) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000001940)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000001a40)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x10001}, 0xc, &(0x7f0000001a00)={&(0x7f0000001980)={0x60, r3, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x104}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6d}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x65d}]}, 0x60}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r4 = dup(r0) r5 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x18040) pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001680)='/dev/autofs\x00', 0x0, 0x0) r9 = eventfd2(0x1, 0x80000) io_submit(r1, 0x7, &(0x7f0000001880)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x1, r0, &(0x7f0000000180)="259c777ddb587b368b811299df47e790f61ec917c1826db953f6933a002eec803808ce7185e49a768bf8555fad570117d4288ccc70307b72d99e0b3307bde5f1d1d04096a9e084b67baedd7aabf55012626325df8c9879fb", 0x58, 0x6, 0x0, 0x0, r4}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x6, 0x100000000, r0, &(0x7f00000002c0)="28a4cc22d646bc095e63c43b94da424352fc1987de5d5f56302d0dd9930db3dfcb75a3302d2d1f19e3dbf3ce82423ed7d0831e9c382915a70fd3fbb3c7bdb610dd802ddfeab8b281e2342a05011cad74414b23fc2bfb7804203cbb3fb71640360763b5a6bf1bcca7b71129abaca6d2a0a92021644b1b2690dcbfcf4613f559ae52362ff804c29bf6113a13ac0c1bf39426032598c8b6a180cee73e4287f8e3efb50fc9b84e887e70648c4473c7aa1173ff495d8668e3ea514a78c1af8696471c11c34ada216b3d2b046ad7fa5bbe4f29fa3dbf8674b3a4be2a8c524404a55fa12934c26d677e23d16cdc55685641c8", 0xef, 0x200, 0x0, 0x0, r5}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x30d, r0, &(0x7f0000000440)="fdd1af91", 0x4, 0x1, 0x0, 0x0, r6}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x6, 0x87000000000, r0, &(0x7f0000000580)="9800ed0739ec6651cadf9100c3368cb27ba3db9015f6cfaedbec824e7deb37918755753f0c12a89a94be2f845aedf3cff6cda4f1cdb2fee03ef2b466ebe6d5e5b22df00683eb096d63ca38ed16f0f21160317d27ae839ab8e608b1506dc2393843fe42a54df4ca881e91c520db62c4f78028db3e7146966972b6a1487e60f6cf214b84ffd7ad82ea7d703667efbb60fa4ea94679455f9ee1f0", 0x99, 0x7, 0x0, 0x1, r7}, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x4a, r0, &(0x7f0000000680)="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", 0x1000, 0x7fff, 0x0, 0x0, r8}, &(0x7f0000001740)={0x0, 0x0, 0x0, 0xe, 0xb5, r0, &(0x7f0000001700)="7a76594d00c04e145fd3fa358572bf5b990fa506bd3f6e9a813010b4cdb939fbb5f84db2143462ce9a41434360fd2fe0", 0x30, 0x1ff, 0x0, 0x1, r9}, &(0x7f0000001840)={0x0, 0x0, 0x0, 0xf, 0x4, r0, &(0x7f0000001780)="8ef7722f832b82d9d6d4c40331cbc087177efbc7da5dd38b46ccc2b731c597799ab9d3c6134d5fadf18ea3825ca9a33a8e6962b7fd4c0f7a7098274185a9a44931b41509d932df7e59b1c236c2af2c699390adf71476e26b2aa630a8ff8734331141b6a7fca8f46af87f568b9a20a50a14ae66357762ac230a9764ce79d1c45ee819f7a17f60aa40751e", 0x8a, 0x101, 0x0, 0x1}]) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000000)='./file1\x00', 0x16) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000001a80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="9644be29018423ece7a4a6acf4054452fc96f731f4411948656922d5df60a6ef123fd9a9dc97534aba36538398e37e1c2bdaf5e70212d001ad82619e61df7ed157dcaf2ddd22cb629f9e605f089ac17867d4485c82656953c66dd95f4a04d0bf6cac573a9f03505b95ac487dbcc86d3fb63d9933ed8ca962de684233f485cafaa274a4781cfaee5529d6da0610216f0464", @ANYRESOCT=r0, @ANYRES16=0x0]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) [ 773.138717] audit: type=1804 audit(1544850373.411:1789): pid=15738 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1087/memory.events" dev="sda1" ino=16882 res=1 [ 773.159266] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 773.172563] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 773.181445] F2FS-fs (loop1): Invalid SB checksum offset: 699892709 05:06:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 05:06:13 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x7a000000, 0x0, 0x820, &(0x7f0000000240)) [ 773.235913] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 773.263143] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 773.281724] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 05:06:13 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0xc0002) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x48260202}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x2c, r2, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}]}]}, 0x2c}}, 0x40000) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000380)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002540)={{{@in6=@ipv4={[], [], @remote}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@loopback}}, &(0x7f0000002640)=0xe8) syz_mount_image$f2fs(&(0x7f00000003c0)='f2fs\x00', &(0x7f0000000400)='./file1\x00', 0x3, 0x3, &(0x7f00000024c0)=[{&(0x7f0000000440)="d5e79d4bb03f0a1a646a59943e3b0b49d8f52bebd6b50fdf9ff3b6e0ab29f49c502aa37e55b2c57d61bdbe3cdc4199696cd2cad8b7275afd6fb0d34e5bfb15bcbbd7ce39b6d8ea863c7a5d699d8c271c5db51a8571e868332016400d3e48ccfed974c4c2c8dec85d625480954f98b0d38a1487dc1bf9f84163bd43a029030dafd66324e8897c39d5c2e53d386445d466d9d5503c53ca87fa0052d238da2dba6c1f39995f05a40690cb5f9e9c4f3631473174fc9dfcf02794c0ba4c29a91dfe0d1fb27b6e7ab64e61a1fde51a48191112e76157e216a95967d1fe49d6542bdce2465a26a375a0fc59762ef7c2ab7c89d3b27d85c32fe898ff1d95d8a783e4e0bc333d93f78913c2bfb9b6abc3ab0eb479becbb9d1eaea5e0273453336fc98826e07610ed95b8ce5e344f1960035c9b5f657438648b86c378ffebddf2d8c5b99753663b543159d7c990b370460d5711cc4909612d82cf170f22caa8063d9de26cc45a68047e4434db73aec14bcb40dcb4915e9d2ea3ba0738dcee1aee3ba26da1679bfed1a94423e9ac26e9090b5043ecf229891d8dc924af3fd7e7a0e8259f905c5e02490170f5da6512b09eb979f6e52913124982e2c4d50056f88e2dc695adf906903345d514d8da20c35315c6a3cced650e8f344297ed5aa6a65ae087fc536affcef6c6020cb10e274fc7dec712b5d91c880e5e3453e65ff798906ce003e4423d74f5c7845babc6c38596850b93a29791f8a1fa68e1d6b2aacc9f6166cfc66a2f3be0a94520d535bc624298d3314ecdad0ab5879242683e6f4063b72588aa5a0bb11089c4724d8de707b04750ed74ee68f33daa220bd4df2a4bb74ca02d9f2ac2de1c217360bd55c863ebf9ee527fec1719256fdf422edaaf1ccc0e6a8aa1c74b968289d001dd54b8c1d8b24538f47e84498a442ef40ae4a95bdec8ccbc0faa7f1d248b1c618866d5be8179baa7556bbdf65957880427dbd92394734649e47c755f3ec76f68aafa48605d77a8d3ce5f417451e2d5693b14ae5ad5e346a191332fb39716f7efe40bae8a3caf4dde69e0cff394236e71acc63b5acd6aaa7de4a962a278589e9d509c59e15d83d004870b91f754b4c9fda7a77b86103854ec65adcf58d04d6f4efbe680fc6110f277ee4c8f9d5d4b3eeb9df51a59d79556a165a47007420f8757d9cb1ddb7b2b7fb2b3c23267e41f13547416db617fee956cb0a8b7a86bced65df77039d6867827f7c98bd65ffccac76387f1a8fbc3b5821542f60cf4bede3e2d767df40f102899b9e0260fb012194d48f1c922ab9aae6bdc9c6aa9e87ad42be884be54ff6935da88f5191b9c9fe3922b84431eebec1f5c176bbfd3b274ad9c6377d6ad24fed5500adb33199402e8dea8458915369c0fe54a4b6a5e132da616bf05620db756263733a3cabc4d41504b972fcbf35f72623ede3ab7e31905151948d6cf76ca1447619f96f7bbac355b2d639db794d80f24298dfd8d9bc53d39c9a2d7d87aceabe6dc21d9daac5e8d22d54ca9a29cebecf90d45e2ee1b76635f47ffe9c534d2289ea80c7a722c7e5576636db7d163be485b2f63f4e137282f786abf1b37ac71e68b824804429159a2c4a0ad10924cc937ed37fe51e8b7b70941ebac993463eb9496e6c0d2eff0c27c4120966bd5ce57b635a13413fbd71049d68b9ac6e8d0d2f2fb8bd0caf55dd782acd000c7af0a0c3c095379b3b7f727ce13445f715ca6fae5da61dbf372c8f92243efcb3e16e37923596ff1d226d99c1dd2fabbfcfe4afde8e138e9c8dfa3d8674c9a1193aebddc7022e236de12e7e0c85dc1c40e057a84c92d199449e8be4c708d194124bfe30b4d6a81461c0c56fa7394c3c86dd617f24fb807e7ed3f01edb8129304c7862350b1e2987d55099e33758512c958482cd99b2ac77736a2e1afa9c1d0f4b62520024cd30c8ca5ed14a4c6f413b40a01c2c142285fa66f96d89bdcf976126696cdccaa4b77f7e5d3ab71a70213ac83a19eadda2a55263ae1861502482d8991b39e3b80eb484c7542e742d203a90a6189b1398335e854f64663cb2f5d3affa1a24a40c198684c8972adc9a658fac770f185808453f12cf58a17e3e28576dc412a487ab067efb4c2007777d7607166492225f3a1cd035017d1d6eba56b2bec851fa9e59c54cdc54462b82eac83351edfe8ae27125abbd75fe9bf77c46a8956172cf166a4253475442dab22fa0ce09117c1d4d1d09d656c8925a059e3524d0941830ca3f2350243423b422f93cec19866c53d8976e9263c381146df93b12c32955ba79f3bca09022f19bbe6c4c30ab7b43cff3459be62a384619949ffe467a16baed9d1f56ba64d340b5c15c5a6ac4deae15569a3866d51c2922228a48c5ebd4f108d7ba6e77048044667e9644a38175ec695b6da28e7b2bea1b14cc9356150dbc5380984a299ed363d6e83338a1c46374e1430dc43d06c9f2adc409e57061b59bdcacd6dbc525305ad311135de221010a505ed119738b294c2c2f3c8f7f6dd4c0789dc3952f1174bfee210c230f5f2d555f2ace1282588ca924a4acb7c93fccdd9f4ea2075c46f9f47117d9b18b9faa2ce17d731060137f80d16cd66d9c82ea80b4b083b309f479352b1ce3cde0e3a078c70f5853b1ecb12f603a97c2de0654724a1bdac592ff45f1ff21f3d55753a481fd070bc555e42eadd662c73de042f67a7483c9edaf48eafdb5c1ceeb3acd58773912989fd43838c45f9142858bb63c41e32174c4bf3c25b60d597adb745a7057bea18a67e5ea6faf5f601bb453efe4c7ed8d299d6b59dafd3467840dce97b62ae968a21e458f9741ec94b7ca9ac72dcf50ace8c443bc6403a9c7352a20389bce86ba4f7c2e28d349bb233595367b3c3aee096c859d3adf58c15a4f761f26866fd410d1211a7f76dafba017dfd20a7952fa6b4354964befb786be0a3c63414fe535a793e1192c9e9a72b040311e50b14fb38c83f20cad3487f84fe2dd8400150de0eecc54e90b7197a4e672958ba8359a1720d4a42f0632dcb14a03ca14cb05de54bc40858307fee1e97c689b6bb8c57397674a5f0da926095f05039646f2bf14c8928da04478da450353f6f2bccfe589427936e8c3095bece758ce2f9e1122901a7b90072783bd392306948c9f9eb02ad0b25e2af708dc0b6dccac4c5fcf33b3ba322810c8a49ff392d465ca88e551a3c708be5d8319d04d0249ef218f78764325ebe44e9960e58625330ffa15f52aa4a64128c680af6d39c75268d917ab68a5955babfa01c925fb6c8deda68c2de3daf06c5bfac0eee34cc32fd9b8a4367f5b960730805b5f3d9c7b8fa37a9d19dd2b910c8359064a8772ac860e22521f5b02ad85a6f67d35fa61b635de624b58c18daba383fc655dca5fb8b00982f4b9fd94c4e53257fcbcb056805e02cd0ae0a8a52cf6c39dcb7cfc70f9c32ef33b15e4a7f00b78aa728c2af8763673a018317274c54b469694bdad0661e620d6d65c48ad999acce7d57439bc277e1aac35f2846dabf54123066d75bd5b16dcecdf431fad31dc77b30f26b5b26d34098d8e554aa7368420d858b2a155b461bfa098e15c8bb65fa79395bbdd2fde45ce7ad8cbba59659aafa48abf16f3e0a00f8455864ce94530a90eb1ef5ecd9ae306bcc8fc735632bff91754dbc75962f19bbb3d4257cc42928ba08a5730d0e07bfa7380d205d0077ecc743cbf62e764b0b9c4b339e864e5e088b181da934396e11b449e8e59490c190a44315d8dbbbb05abfe89d1c8959e7cc59e7bdb38c600d090dc8c6e0bf7ff073ac8a2ec7336158b9b660f59c6de4cc0d8ddca6a176e2139f44c44ed64983474fd8457a61423475914f7a02e3e5263919f2fa1055452ecd47cac7f0bf65fce6d3efcee0751eb062b492e783bd1d829ec7bc52b054e5e3ac3b147a4a4b7b6157b3b845d363015b771cb50804e6a1239c325645033f8a5a9ab547b6f7e6b9f04ec486a9df1a7c487ac746d8bfb5bd4d5f6a1d72748f83af9742cae2205b01d9ca35ba1168dfacb99472f658cfbaf2e885bcfc1bbf4ce5a2dc8bb24a08fe61fd400f00eb95aa43319cf9d89ecf6162bbbebcc66d52246871b74abcfb9dddd8ea60ea60960ef145b95febb33f00734efa5b7140b0e5658fa48a8ac382c6cabb802f976858d5f28fcf6da8834120cc9a1ff30889528e089efc5b905397fec8557ead019df2751dcc3f42f5c466c9ff0121dda6b7bb95207ca5826bb605061bceaf6e78d058c6c650d02f55671667c9fbb4501c53bb89e5ed24a09f8530f21e0fecfed8a47412776472168b7ed5d894ba8c28e26ae11882fa64b2b11e482f2c22f5e7f5ab921fe39598cca812ad8b72c0439d0d41ddfd6adcf43a259aa600f6807c91619a8459c065350d6600cf242b3e2f913576bc7cc3f6800a3d4bebbd6a2e6b2a83427745d4983bced695405fd1a9d7f7b9385c9978a8278e84a7554a6507bc56b8f5725ec1526272af9005505c722bf4f1d57f9bfbcae3e9cbb832f635d67af9fcf68e7d6b0bbebe464e97a8439ee4b8d9a00dcbd2f0977f04d080718dcd11fcba4c4558ac7eda07f7db87267516b3773829bb9ba9473a51074fad5c6e9fc2b281e9cd9470dc2d00425453218f75a66bb8509e1c53366dd93d2e3df71749fc37fca67272cd4735de56f07add5ff2dbea7ca54b15996978116b5fbdac2227f1cbf127e5525ab77ff6022b212c14526c0feaefcbf7650262d08770035cf17fa7278cdc22530c1b4fa8cd1d1e532e892f344db44ae94fb4017021e05b1a9f9c85e3498b5a1f8e2f7daccf3540c25e9dca9d70c845a6c03f32e1069d8d2709c1f8ac8e63076715b122fed55d670b07b25716743b7a01e260f9a54d91c05062263c61bf034e5f48b56f56d02477fdf91e6c27e618b5cb530de83a708047961a30dee3b9c545b81f049d914793aff1d4398bdec3279e79b12e2624b4f36964ff6f779de7ce38acd152972604464020ab68fb440342df33141566b7c3c52b1ded1f954dc41136809c1294065c8e4efa91273cf4b14f247b01b9a2c621eeef4322deafdd886f1a58e1d8bc7dd5d229bcad43f5a873bccd05cf0049dbbc07214ceab3c0d4e043b692583531c847add7dd58a5cfb37b4856184020bbdf3dfe1f2c630b77f7d8b1d6b24db1da9ceef7c8ffd51bb5684e2aa3ed09e2d22ebb07647cf55475b04912e8294c68fbeb03b4190fe75d6f05ee6c60724409eb48897b6e5d9b7453c8b0f8853a67277e5fb61cb5eb8e91b761e86b800255d8cf9ca2bbe1e22c5448ff7a6d5e8a639eccbecfb0d0294fe238982c165ebe5046931238acee14f9909034d445765fcc13a0d5b4ba43b5d72b646973576a2477c54c62de474c86071652e83a81b03a4ec2c3acf66b7d6eacc1d86eedd1ed19813391a8d6ecffdcc7b323f7410697c0f9ebc19a91b9056459d645d7f7340ac3901c39c3bd832e885c6006879241414dd1fc108c300f28b0b2811f89358e5009c8b60e6ee675a4ff1744edbc59edbb135f760f12cfa8db7f1f3ee5f49d13d7702bc5d335ec9c93eb17d6d7b690337d0e9489d8d459dc2378df515460a0051a4d3baf39835b17010a7f9e74ebd210bf6c9d83b2b86597de8ce6bab8918cfbe1c4ee7897904011275578147500fd428b0e31c3758ed1f37e307fe6f1c9c7b0142ec9968fd35c5ce7e9fb388eb70b238d747f7335687f9fb7e5c750b704704e4768c0b5c8fe67751ab5ec039d136cb1a6a2d9d72c1c8756353594734e38f0e05d1338270d442d4e0187af8ba592243399fc1e1ec", 0x1000, 0xfffffffffffffff8}, {&(0x7f0000001440)="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", 0x1000, 0x7}, {&(0x7f0000002440)="3da83b393dd52b607cf46fb221d0233e6aaaa632c445179a192cff2127d9d93162ae5d5e149bdaea343e7fe6fd0a3d21b47d76f89b16812e721b33f630f4b10d575810cfd7425175bbe471b4d7faa9a46a23", 0x52, 0x5}], 0x8, &(0x7f0000002680)={[{@nodiscard='nodiscard'}, {@two_active_logs='active_logs=2'}], [{@fowner_gt={'fowner>', r3}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@measure='measure'}]}) syz_mount_image$ext4(&(0x7f0000000100)="65f8742d00", &(0x7f0000000140)='./file1\x00', 0x40, 0x0, 0x0, 0x40000820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 773.426983] audit: type=1804 audit(1544850373.701:1790): pid=15755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/870/memory.events" dev="sda1" ino=16833 res=1 05:06:13 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x5, 0x0, 0x820, &(0x7f0000000240)) [ 773.566172] audit: type=1804 audit(1544850373.831:1791): pid=15760 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir170986872/syzkaller.C8NVxw/870/memory.events" dev="sda1" ino=16833 res=1 05:06:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x0, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000280)) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x0, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x80, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000280)=[0x7ff, 0xec]) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x41, 0x0) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f00000000c0)=0x1) socket$inet6(0xa, 0xa, 0x5) 05:06:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x100, 0x0) inotify_add_watch(r0, &(0x7f00000000c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f00000001c0)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x1, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000300)='./file1\x00', 0x20, 0x0, &(0x7f00000001c0), 0x820, &(0x7f00000003c0)) 05:06:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0xa, 0x3, 0x8, 0x7, "ca5d62a95b41b2"}, 0x13) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000040)=0x60, 0x80800) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x1, 0x40, 0xa, 0x2, 0x4, 0xfff, 0xfffffffffffffffb, 0xae80, 0xfffffffffffffff9, 0x101, 0xa5ea, 0x6, 0x1, 0x1, 0x0, 0x8000, 0x3, 0x0, 0x101, 0x0, 0x8, 0x7ff, 0x1ff, 0x1bc, 0x6, 0x0, 0x80, 0x0, 0xa543, 0x8, 0x1f, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r2, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x3000, 0x500001c) 05:06:13 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x6, 0x0, 0x820, &(0x7f0000000240)) [ 773.598470] audit: type=1804 audit(1544850373.871:1792): pid=15766 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir876624416/syzkaller.K4vnSi/1087/memory.events" dev="sda1" ino=16882 res=1 [ 773.653160] F2FS-fs (loop1): Invalid SB checksum offset: 699892709 [ 773.703858] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 773.740227] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 773.751427] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 773.790397] F2FS-fs (loop1): Invalid SB checksum offset: 699892709 [ 773.814524] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 773.868714] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 05:06:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfff}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1000}}, {@orlov='orlov'}, {@usrjquota='usrjquota='}, {@nodiscard='nodiscard'}, {@usrjquota='usrjquota='}, {@abort='abort'}, {@errors_remount='errors=remount-ro'}]}) [ 773.929382] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 05:06:14 executing program 2: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x4000000000000000, 0x0, 0x820, &(0x7f0000000240)) 05:06:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x4000, 0x10) lsetxattr$security_evm(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f0000000300)=@ng={0x4, 0x11, "0027fb81d85e"}, 0x8, 0x3) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 774.052348] ================================================================== [ 774.059968] BUG: KASAN: use-after-free in __ext4_expand_extra_isize+0x16f/0x240 [ 774.067409] Write of size 4063 at addr ffff8881978b31a0 by task syz-executor2/6028 [ 774.075102] [ 774.075123] CPU: 0 PID: 6028 Comm: syz-executor2 Not tainted 4.20.0-rc6+ #373 [ 774.075130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.075134] Call Trace: [ 774.075151] dump_stack+0x244/0x39d [ 774.075167] ? dump_stack_print_info.cold.1+0x20/0x20 [ 774.075178] ? printk+0xa7/0xcf [ 774.075190] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 774.075225] print_address_description.cold.7+0x9/0x1ff [ 774.075238] kasan_report.cold.8+0x242/0x309 [ 774.075251] ? __ext4_expand_extra_isize+0x16f/0x240 [ 774.075268] check_memory_region+0x13e/0x1b0 [ 774.075283] memset+0x23/0x40 [ 774.112862] __ext4_expand_extra_isize+0x16f/0x240 [ 774.112879] ext4_mark_inode_dirty+0x8f9/0xb20 [ 774.112910] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 774.112924] ? __might_sleep+0x95/0x190 [ 774.112960] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 774.112976] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 774.112994] ? __lock_is_held+0xb5/0x140 [ 774.113019] ? ext4_setattr+0x28f0/0x28f0 [ 774.173017] ext4_dirty_inode+0x97/0xc0 [ 774.176985] __mark_inode_dirty+0x7c3/0x1510 [ 774.181392] ? __inode_attach_wb+0x13f0/0x13f0 [ 774.185963] ? find_held_lock+0x36/0x1c0 [ 774.190030] ? mark_held_locks+0xc7/0x130 [ 774.194176] ? ktime_get_coarse_real_ts64+0x273/0x370 [ 774.199364] ? ktime_get_coarse_real_ts64+0x273/0x370 [ 774.204555] ? trace_hardirqs_on+0xbd/0x310 [ 774.208880] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 774.214106] ? current_time+0x72/0x1b0 [ 774.214121] ? trace_hardirqs_off_caller+0x310/0x310 [ 774.214155] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 774.214167] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 774.214180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 774.214192] ? timespec64_trunc+0xea/0x180 [ 774.214205] ? inode_init_owner+0x340/0x340 [ 774.214222] generic_update_time+0x26a/0x450 [ 774.214234] ? file_remove_privs+0x540/0x540 [ 774.256274] ? __sb_start_write+0x1b2/0x370 [ 774.260594] touch_atime+0x29c/0x320 [ 774.264301] ? file_remove_privs+0x540/0x540 [ 774.268701] ? file_remove_privs+0x540/0x540 [ 774.273120] ? atime_needs_update+0x710/0x710 [ 774.277619] trailing_symlink+0x2cb/0x970 [ 774.281764] path_mountpoint+0x762/0x2180 [ 774.285957] ? save_stack+0x43/0xd0 [ 774.289622] ? kasan_kmalloc+0xc7/0xe0 [ 774.293534] ? kasan_slab_alloc+0x12/0x20 [ 774.297685] ? kmem_cache_alloc+0x12e/0x730 [ 774.302020] ? getname_flags+0xd0/0x590 [ 774.306032] ? path_openat+0x5150/0x5150 [ 774.310097] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 774.315632] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 774.320645] ? __check_object_size+0xb1/0x782 [ 774.325144] ? usercopy_warn+0x110/0x110 [ 774.329242] ? check_preemption_disabled+0x48/0x280 [ 774.334257] filename_mountpoint+0x245/0x460 [ 774.338675] ? user_path_at_empty+0x50/0x50 [ 774.342989] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 774.348528] ? kmem_cache_alloc+0x33a/0x730 [ 774.352880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 774.358436] ? getname_flags+0x26e/0x590 [ 774.362494] user_path_mountpoint_at+0x37/0x40 [ 774.367075] ksys_umount+0x1c5/0x12d0 [ 774.370906] ? rcu_pm_notify+0xc0/0xc0 [ 774.374793] ? putname+0xf2/0x130 [ 774.378278] ? __detach_mounts+0x430/0x430 [ 774.382504] ? rcu_read_lock_sched_held+0x14f/0x180 [ 774.387516] ? kmem_cache_free+0x24f/0x290 [ 774.391746] ? putname+0xf7/0x130 [ 774.395197] ? do_unlinkat+0x23b/0xa30 [ 774.399093] ? __ia32_sys_rmdir+0x40/0x40 [ 774.403249] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 774.408778] ? strncpy_from_user+0x411/0x5a0 [ 774.413190] ? do_syscall_64+0x9a/0x820 [ 774.417165] ? do_syscall_64+0x9a/0x820 [ 774.421166] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 774.425760] ? trace_hardirqs_on+0xbd/0x310 [ 774.430077] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 774.435451] ? trace_hardirqs_off_caller+0x310/0x310 [ 774.440590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 774.446171] ? getname_flags+0x26e/0x590 [ 774.450251] __x64_sys_umount+0x54/0x80 [ 774.454238] do_syscall_64+0x1b9/0x820 [ 774.458131] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 774.463522] ? syscall_return_slowpath+0x5e0/0x5e0 [ 774.468458] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 774.473303] ? trace_hardirqs_on_caller+0x310/0x310 [ 774.478319] ? prepare_exit_to_usermode+0x291/0x3b0 [ 774.483339] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 774.488242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 774.493439] RIP: 0033:0x45a0a7 [ 774.496656] Code: 44 00 00 b8 08 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 774.515553] RSP: 002b:00007ffd954d3748 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 774.523253] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a0a7 [ 774.530510] RDX: 0000000000402eb0 RSI: 0000000000000002 RDI: 00007ffd954d37f0 [ 774.537801] RBP: 00000000000010c3 R08: 0000000000000000 R09: 0000000000000011 [ 774.545068] R10: 000000000000000a R11: 0000000000000202 R12: 00007ffd954d4880 [ 774.552333] R13: 00000000025d2940 R14: 0000000000000000 R15: 0000000000000002 [ 774.559603] [ 774.561224] The buggy address belongs to the page: [ 774.566144] page:ffffea00065e2cc0 count:2 mapcount:0 mapping:ffff8881cc4bf658 index:0x445 [ 774.574453] flags: 0x2fffc000000203a(referenced|dirty|lru|active|private) [ 774.581384] raw: 02fffc000000203a ffffea0006882808 ffffea0006acd788 ffff8881cc4bf658 [ 774.589266] raw: 0000000000000445 ffff8881d4826348 00000002ffffffff ffff88818104c380 [ 774.597133] page dumped because: kasan: bad access detected [ 774.602835] page->mem_cgroup:ffff88818104c380 [ 774.607569] [ 774.609197] Memory state around the buggy address: [ 774.614138] ffff8881978b3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 774.621485] ffff8881978b3f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 774.628843] >ffff8881978b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 774.636195] ^ [ 774.639549] ffff8881978b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 774.646909] ffff8881978b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 05:06:14 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0xc0002) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x48260202}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x2c, r2, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}]}]}, 0x2c}}, 0x40000) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000380)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000004d80)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002540)={{{@in6=@ipv4={[], [], @remote}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@loopback}}, &(0x7f0000002640)=0xe8) syz_mount_image$f2fs(&(0x7f00000003c0)='f2fs\x00', &(0x7f0000000400)='./file1\x00', 0x3, 0x3, &(0x7f00000024c0)=[{&(0x7f0000000440)="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", 0x1000, 0xfffffffffffffff8}, {&(0x7f0000001440)="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", 0x1000, 0x7}, {&(0x7f0000002440)="3da83b393dd52b607cf46fb221d0233e6aaaa632c445179a192cff2127d9d93162ae5d5e149bdaea343e7fe6fd0a3d21b47d76f89b16812e721b33f630f4b10d575810cfd7425175bbe471b4d7faa9a46a23", 0x52, 0x5}], 0x8, &(0x7f0000002680)={[{@nodiscard='nodiscard'}, {@two_active_logs='active_logs=2'}], [{@fowner_gt={'fowner>', r3}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@measure='measure'}]}) [ 774.654266] ================================================================== [ 774.661610] Disabling lock debugging due to kernel taint [ 774.667897] Kernel panic - not syncing: panic_on_warn set ... [ 774.673787] CPU: 1 PID: 6028 Comm: syz-executor2 Tainted: G B 4.20.0-rc6+ #373 [ 774.682435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.691767] Call Trace: [ 774.694356] dump_stack+0x244/0x39d [ 774.697995] ? dump_stack_print_info.cold.1+0x20/0x20 [ 774.703176] panic+0x2ad/0x55c [ 774.706362] ? add_taint.cold.5+0x16/0x16 [ 774.710506] ? preempt_schedule+0x4d/0x60 [ 774.714644] ? ___preempt_schedule+0x16/0x18 [ 774.719045] ? trace_hardirqs_on+0xb4/0x310 [ 774.723389] kasan_end_report+0x47/0x4f [ 774.727353] kasan_report.cold.8+0x76/0x309 [ 774.731663] ? __ext4_expand_extra_isize+0x16f/0x240 [ 774.736787] check_memory_region+0x13e/0x1b0 [ 774.741772] memset+0x23/0x40 [ 774.744883] __ext4_expand_extra_isize+0x16f/0x240 [ 774.749817] ext4_mark_inode_dirty+0x8f9/0xb20 [ 774.754412] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 774.759329] ? __might_sleep+0x95/0x190 [ 774.763294] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 774.768829] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 774.774563] ? __lock_is_held+0xb5/0x140 [ 774.778616] ? ext4_setattr+0x28f0/0x28f0 [ 774.782750] ext4_dirty_inode+0x97/0xc0 [ 774.786716] __mark_inode_dirty+0x7c3/0x1510 [ 774.791115] ? __inode_attach_wb+0x13f0/0x13f0 [ 774.795689] ? find_held_lock+0x36/0x1c0 [ 774.799743] ? mark_held_locks+0xc7/0x130 [ 774.803879] ? ktime_get_coarse_real_ts64+0x273/0x370 [ 774.809093] ? ktime_get_coarse_real_ts64+0x273/0x370 [ 774.814276] ? trace_hardirqs_on+0xbd/0x310 [ 774.818589] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 774.823768] ? current_time+0x72/0x1b0 [ 774.827644] ? trace_hardirqs_off_caller+0x310/0x310 [ 774.832743] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 774.837747] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 774.842929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 774.848455] ? timespec64_trunc+0xea/0x180 [ 774.852678] ? inode_init_owner+0x340/0x340 [ 774.856992] generic_update_time+0x26a/0x450 [ 774.861431] ? file_remove_privs+0x540/0x540 [ 774.865853] ? __sb_start_write+0x1b2/0x370 [ 774.870167] touch_atime+0x29c/0x320 [ 774.873867] ? file_remove_privs+0x540/0x540 [ 774.878263] ? file_remove_privs+0x540/0x540 [ 774.882660] ? atime_needs_update+0x710/0x710 [ 774.887162] trailing_symlink+0x2cb/0x970 [ 774.891305] path_mountpoint+0x762/0x2180 [ 774.895471] ? save_stack+0x43/0xd0 [ 774.899104] ? kasan_kmalloc+0xc7/0xe0 [ 774.902989] ? kasan_slab_alloc+0x12/0x20 [ 774.907142] ? kmem_cache_alloc+0x12e/0x730 [ 774.911455] ? getname_flags+0xd0/0x590 [ 774.915438] ? path_openat+0x5150/0x5150 [ 774.919492] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 774.925020] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 774.930025] ? __check_object_size+0xb1/0x782 [ 774.934520] ? usercopy_warn+0x110/0x110 [ 774.938585] ? check_preemption_disabled+0x48/0x280 [ 774.943600] filename_mountpoint+0x245/0x460 [ 774.947995] ? user_path_at_empty+0x50/0x50 [ 774.952308] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 774.957843] ? kmem_cache_alloc+0x33a/0x730 [ 774.962157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 774.967684] ? getname_flags+0x26e/0x590 [ 774.971739] user_path_mountpoint_at+0x37/0x40 [ 774.976312] ksys_umount+0x1c5/0x12d0 [ 774.980135] ? rcu_pm_notify+0xc0/0xc0 [ 774.984047] ? putname+0xf2/0x130 [ 774.987497] ? __detach_mounts+0x430/0x430 [ 774.991723] ? rcu_read_lock_sched_held+0x14f/0x180 [ 774.996729] ? kmem_cache_free+0x24f/0x290 [ 775.000972] ? putname+0xf7/0x130 [ 775.004428] ? do_unlinkat+0x23b/0xa30 [ 775.008330] ? __ia32_sys_rmdir+0x40/0x40 [ 775.012493] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 775.018017] ? strncpy_from_user+0x411/0x5a0 [ 775.022455] ? do_syscall_64+0x9a/0x820 [ 775.026414] ? do_syscall_64+0x9a/0x820 [ 775.030377] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 775.034951] ? trace_hardirqs_on+0xbd/0x310 [ 775.039261] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.044648] ? trace_hardirqs_off_caller+0x310/0x310 [ 775.049742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.055273] ? getname_flags+0x26e/0x590 [ 775.059321] __x64_sys_umount+0x54/0x80 [ 775.063284] do_syscall_64+0x1b9/0x820 [ 775.067160] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 775.072514] ? syscall_return_slowpath+0x5e0/0x5e0 [ 775.077428] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 775.082257] ? trace_hardirqs_on_caller+0x310/0x310 [ 775.087265] ? prepare_exit_to_usermode+0x291/0x3b0 [ 775.092274] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 775.097109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.102285] RIP: 0033:0x45a0a7 [ 775.105479] Code: 44 00 00 b8 08 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 775.124370] RSP: 002b:00007ffd954d3748 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 775.132071] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a0a7 [ 775.139342] RDX: 0000000000402eb0 RSI: 0000000000000002 RDI: 00007ffd954d37f0 [ 775.146602] RBP: 00000000000010c3 R08: 0000000000000000 R09: 0000000000000011 [ 775.153863] R10: 000000000000000a R11: 0000000000000202 R12: 00007ffd954d4880 [ 775.161117] R13: 00000000025d2940 R14: 0000000000000000 R15: 0000000000000002 [ 775.169369] Kernel Offset: disabled [ 775.172988] Rebooting in 86400 seconds..