00100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000e5ffffff610adcff000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41f00}, 0x48) 16:51:18 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(0xffffffffffffffff, 0x0, 0x3b) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) 16:51:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@sysvgroups='sysvgroups'}, {@inode64='inode64'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") 16:51:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x0}, 0x20) 16:51:18 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r0, &(0x7f00000002c0), 0x0, 0x2}, 0x20) 16:51:18 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000680)=0xfff, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1ffc}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x400100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000340)='lp\x00', 0x3) gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 16:51:18 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(0xffffffffffffffff, 0x0, 0x3b) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) 16:51:19 executing program 5: set_mempolicy(0x4002, &(0x7f0000001240)=0x7, 0x7) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x4000, &(0x7f0000001280)="35a67ef690f886f9d87091d9795b4a0d56f644ff45bba0038b2511915fe30b8d1492a91cd2ed4650ad45847ce8282501ee7ce3fc514b46ec0dd88ac70fc0909a6cea11abc94d2c61515881", 0x0, &(0x7f0000001300), &(0x7f0000001340)) [ 273.392664][T10704] XFS (loop2): Invalid superblock magic number 16:51:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:19 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x3b) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(r0, r1) 16:51:19 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_AIE_OFF(r0, 0x7004) 16:51:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:19 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='coredump_filter\x00') read(r0, 0x0, 0x7b3c4302) 16:51:19 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) setpriority(0x0, 0x0, 0x6c7) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) request_key(0x0, 0x0, &(0x7f0000000140)='vboxnet1\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) getpid() sched_getparam(0x0, 0x0) 16:51:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@sysvgroups='sysvgroups'}, {@inode64='inode64'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") 16:51:19 executing program 5: add_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) 16:51:19 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x1, 'bond_slave_1\x00'}, 0x18) [ 274.100503][T10776] IPVS: sync thread started: state = MASTER, mcast_ifn = bond_slave_1, syncid = 0, id = 0 [ 274.135276][T10759] XFS (loop2): Invalid superblock magic number 16:51:19 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:19 executing program 0: socket(0x6000800000000010, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000080), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)}, 0x10) 16:51:19 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000680)=0xfff, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1ffc}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x400100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000340)='lp\x00', 0x3) gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 16:51:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x6, 0x6, 0x9}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000100), 0x0}, 0x18) 16:51:20 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x3b) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(r0, r1) 16:51:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='wchan\x00') perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/177, 0xb1}], 0x1, 0x0) 16:51:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x11, &(0x7f00000002c0)=ANY=[@ANYBLOB="f400000000001000620adcff000000009500000000000000b6eb8b0f134f71e5ea928fd1b48af5f2105c0ae96b63861be6f7ea4c1e2d01665134cef8620e2b49facae4d8b02c2b131bca1af9869f0a43eb8b533dafd89107f1c033a0e64028e075a3ee9771cfdfb7553fa587f6dcf503f4c61cbcfe222ee62cb595eab780a70cac456747562cf721bf4a370fab3f"], 0x0}, 0x48) 16:51:20 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f00000003c0)="83", 0x1, 0xffffffffffffffff) keyctl$chown(0x4, r0, 0x0, 0x0) 16:51:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@sysvgroups='sysvgroups'}, {@inode64='inode64'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") 16:51:20 executing program 5: socket(0x6000800000000010, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000080), 0x0}, 0x20) 16:51:20 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000340)=0x1fbffff, 0x3fd) 16:51:20 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'raw\x00'}, 0x0) [ 274.805135][T10817] XFS (loop2): Invalid superblock magic number 16:51:20 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000540)={@broadcast, @remote, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x34}, @rand_addr=0x80000000, {[@timestamp={0x44, 0x8, 0x5, 0x1, 0x0, [{}]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 16:51:20 executing program 5: r0 = socket$inet6(0xa, 0x80803, 0x87) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000100)={'filter\x00'}, 0x0) 16:51:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:20 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x3b) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(r0, r1) 16:51:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@sysvgroups='sysvgroups'}, {@inode64='inode64'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") 16:51:20 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:20 executing program 5: syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000aa00004e200008907800000000000000000000000000000000"], 0x0) 16:51:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0x8, &(0x7f0000000080)=@framed={{}, [@jmp={0x5, 0x0, 0xf, 0x7, 0xd, 0xfffffffffffffff8, 0x4}, @generic={0x3799, 0x100, 0xfffffffffffffbff, 0x3f, 0x10000}, @generic={0x1000, 0xfffffffffffffff8, 0x8, 0x100000001}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000140)='GPL\x00', 0xffffffff, 0x9e, &(0x7f0000000240)=""/158, 0x0, 0x1}, 0x48) 16:51:21 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000080)="0573", 0x0}, 0x18) 16:51:21 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x4d}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x48) dup2(r0, r1) 16:51:21 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000080)=""/154, &(0x7f0000000140)=0x9a) [ 275.550128][T10854] XFS (loop2): Invalid superblock magic number 16:51:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:21 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:21 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x80000000000004, 0x4, 0x400000000004, 0x9}, 0x2c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) 16:51:21 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x3b) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) dup2(r0, r1) 16:51:21 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:21 executing program 4: clone(0x3fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x4}, 0x3d5) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) 16:51:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@sysvgroups='sysvgroups'}, {@inode64='inode64'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") 16:51:21 executing program 5: clone(0x100100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$bt_hci(r0, 0x0, 0x60, &(0x7f00001e3000)=""/30, &(0x7f0000d23000)=0x44) getxattr(0x0, 0x0, 0x0, 0x0) capset(0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 16:51:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:21 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:22 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r2, 0x8, r0) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r0, 0x16) 16:51:22 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 276.451694][T10933] XFS (loop2): Invalid superblock magic number 16:51:22 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup2(r0, r0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x129f) sendto$inet(r0, &(0x7f0000001040)="c340", 0x2, 0x1, 0x0, 0x0) r2 = dup(r0) sendmmsg(r1, &(0x7f0000008e40)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="9b", 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$unix(r2, &(0x7f0000000540)=[{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)='/', 0x1}], 0x1}], 0x1, 0x3) 16:51:22 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:22 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x3b) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) dup2(r0, r1) 16:51:22 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) write(0xffffffffffffffff, &(0x7f0000000100)='^', 0x1) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f00000001c0)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) dup3(r0, r1, 0x0) 16:51:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@sysvgroups='sysvgroups'}, {@inode64='inode64'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") 16:51:22 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) write(0xffffffffffffffff, &(0x7f0000000100)='^', 0x1) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000140)=""/163, 0xa3}], 0x1, 0x10400003) [ 277.326525][T11012] XFS (loop2): Invalid superblock magic number 16:51:23 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r2, 0x8, r0) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r0, 0x16) 16:51:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:23 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) write(0xffffffffffffffff, &(0x7f0000000100)='^', 0x1) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:23 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='sched\x00') exit(0x0) write$P9_RLOCK(r0, 0x0, 0x0) 16:51:23 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:23 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x3b) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) dup2(r0, r1) 16:51:23 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@sysvgroups='sysvgroups'}, {@inode64='inode64'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") 16:51:23 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:23 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:23 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x3b) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(0xffffffffffffffff, r1) [ 278.196440][T11077] XFS (loop2): Invalid superblock magic number 16:51:24 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r2, 0x8, r0) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r0, 0x16) 16:51:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:24 executing program 0: exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000160007031dfffd946fa2830020200a00050000000003fffffffffffff000ff7e", 0x24}], 0x1}, 0x0) 16:51:24 executing program 0: exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:24 executing program 5: r0 = gettid() rt_sigqueueinfo(r0, 0x0, 0x0) 16:51:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:24 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) 16:51:24 executing program 0: exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x8000000010006, 0x0, 0x0, 0x50000}]}) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) 16:51:24 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 278.783583][ T26] audit: type=1326 audit(1553705484.399:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11154 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0x50000 [ 278.817268][ T26] audit: type=1326 audit(1553705484.409:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11154 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458209 code=0x50000 [ 278.850738][ T26] audit: type=1326 audit(1553705484.409:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11154 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458209 code=0x50000 [ 278.911554][ T26] audit: type=1326 audit(1553705484.409:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11154 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458209 code=0x50000 [ 278.935763][ T26] audit: type=1326 audit(1553705484.409:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11154 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458209 code=0x50000 [ 278.966889][ T26] audit: type=1326 audit(1553705484.409:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11154 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458209 code=0x50000 [ 278.989994][ T26] audit: type=1326 audit(1553705484.409:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11154 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458209 code=0x50000 [ 279.012206][ T26] audit: type=1326 audit(1553705484.409:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11154 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458209 code=0x50000 [ 279.034550][ T26] audit: type=1326 audit(1553705484.409:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11154 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458209 code=0x50000 [ 279.056816][ T26] audit: type=1326 audit(1553705484.409:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11154 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458209 code=0x50000 16:51:24 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x3b) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(0xffffffffffffffff, r1) 16:51:24 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r2, 0x8, r0) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r0, 0x16) 16:51:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x6, 0x1}, 0x20) 16:51:24 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:24 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x2000000000, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:24 executing program 5: timer_settime(0x0, 0x0, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1a, 0x0, &(0x7f0000000000)=0xffffffffffffff9b) write$eventfd(0xffffffffffffffff, 0x0, 0x0) 16:51:25 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="850000002e000000b5000000ddffffff9500000000000000"], 0x0, 0x1, 0xc3, &(0x7f0000000480)=""/195}, 0x48) 16:51:25 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(0x0, 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:25 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x12) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 16:51:25 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x3b) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(0xffffffffffffffff, r1) 16:51:25 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r2, 0x8, r0) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) 16:51:25 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(0x0, 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:25 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x12) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 16:51:25 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x2000000000, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:25 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(0x0, 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:25 executing program 5: ptrace$setsig(0x4203, 0x0, 0x0, 0x0) 16:51:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:26 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:26 executing program 5: unshare(0x400) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x00') preadv(r0, 0x0, 0x0, 0x0) 16:51:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x6, 0xfff, 0x6, 0x1, 0xffffffff}) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 16:51:26 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x3b) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, 0xffffffffffffffff) 16:51:26 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r2, 0x8, r0) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) 16:51:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:26 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x6, 0xfff, 0x6, 0x1, 0xffffffff}) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 16:51:26 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x2000000000, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x6, 0xfff, 0x6, 0x1, 0xffffffff}) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 16:51:26 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(0xffffffffffffffff, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:27 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:27 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:27 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x3b) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, 0xffffffffffffffff) 16:51:27 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r2, 0x8, r0) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) 16:51:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x6, 0xfff, 0x6, 0x1, 0xffffffff}) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 16:51:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(0xffffffffffffffff, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:27 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:27 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x2000000000, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0) msgget(0xffffffffffffffff, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) fsync(0xffffffffffffffff) 16:51:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(0xffffffffffffffff, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:27 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100), 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(0xffffffffffffffff, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='task\x00') getdents(r0, &(0x7f00000004c0)=""/229, 0xe5) 16:51:28 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100), 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:28 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x3b) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, 0xffffffffffffffff) 16:51:28 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r2, 0x8, r0) fcntl$setsig(r2, 0xa, 0x12) tkill(r0, 0x16) 16:51:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:28 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") read$FUSE(r0, &(0x7f0000000180), 0x1000) read$FUSE(r0, 0x0, 0x0) 16:51:28 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100), 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:28 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x2000000000, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:28 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x2000000000, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, &(0x7f0000000180)=""/232, 0xe8) getdents(r0, 0x0, 0x0) 16:51:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:28 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x2000000000, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:28 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, &(0x7f0000000180)=""/232, 0xe8) getdents(r0, 0x0, 0x0) 16:51:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, &(0x7f0000000180)=""/232, 0xe8) getdents(r0, 0x0, 0x0) 16:51:31 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r2, 0x8, r0) fcntl$setsig(r2, 0xa, 0x12) tkill(r0, 0x16) 16:51:31 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:31 executing program 2: ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 16:51:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, &(0x7f0000000180)=""/232, 0xe8) getdents(r0, 0x0, 0x0) 16:51:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, &(0x7f0000000180)=""/232, 0xe8) getdents(r0, 0x0, 0x0) 16:51:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, 0x0, 0x0) 16:51:31 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:51:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, &(0x7f0000000180)=""/232, 0xe8) getdents(r0, 0x0, 0x0) 16:51:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:31 executing program 2: ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 16:51:31 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 16:51:34 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r2, 0x8, r0) fcntl$setsig(r2, 0xa, 0x12) tkill(r0, 0x16) 16:51:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, 0x0, 0x0) 16:51:34 executing program 2: ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 16:51:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, &(0x7f0000000180)=""/232, 0xe8) getdents(r0, 0x0, 0x0) 16:51:34 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 16:51:34 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 16:51:34 executing program 2: r0 = syz_open_dev$loop(0x0, 0x2000000000, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, 0x0, 0x0) 16:51:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, &(0x7f0000000180)=""/232, 0xe8) 16:51:34 executing program 5: getdents(0xffffffffffffffff, &(0x7f0000000180)=""/232, 0xe8) getdents(0xffffffffffffffff, 0x0, 0x0) 16:51:37 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r2, 0x8, r0) dup2(r2, r3) tkill(r0, 0x16) 16:51:37 executing program 2: r0 = syz_open_dev$loop(0x0, 0x2000000000, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:37 executing program 1: getdents(0xffffffffffffffff, &(0x7f0000000180)=""/232, 0xe8) 16:51:37 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 16:51:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:37 executing program 5: getdents(0xffffffffffffffff, &(0x7f0000000180)=""/232, 0xe8) getdents(0xffffffffffffffff, 0x0, 0x0) 16:51:37 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 16:51:37 executing program 5: getdents(0xffffffffffffffff, &(0x7f0000000180)=""/232, 0xe8) getdents(0xffffffffffffffff, 0x0, 0x0) 16:51:37 executing program 2: r0 = syz_open_dev$loop(0x0, 0x2000000000, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:37 executing program 1: getdents(0xffffffffffffffff, &(0x7f0000000180)=""/232, 0xe8) 16:51:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:38 executing program 5: r0 = syz_open_procfs(0x0, 0x0) getdents(r0, &(0x7f0000000180)=""/232, 0xe8) getdents(r0, 0x0, 0x0) 16:51:38 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\x19|K!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)f\x83c\xe1OR\x10H', 0x0) write(r0, &(0x7f0000000100)='^', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 16:51:38 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:38 executing program 1: getdents(0xffffffffffffffff, &(0x7f0000000180)=""/232, 0xe8) 16:51:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:38 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r2, 0x8, r0) dup2(r2, r3) tkill(r0, 0x16) 16:51:38 executing program 5: r0 = syz_open_procfs(0x0, 0x0) getdents(r0, &(0x7f0000000180)=""/232, 0xe8) getdents(r0, 0x0, 0x0) 16:51:38 executing program 1: r0 = syz_open_procfs(0x0, 0x0) getdents(r0, &(0x7f0000000180)=""/232, 0xe8) 16:51:38 executing program 5: r0 = syz_open_procfs(0x0, 0x0) getdents(r0, &(0x7f0000000180)=""/232, 0xe8) getdents(r0, 0x0, 0x0) 16:51:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:38 executing program 0: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000057000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 16:51:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(0xffffffffffffffff, &(0x7f0000000180)=""/232, 0xe8) getdents(r0, 0x0, 0x0) 16:51:38 executing program 1: r0 = syz_open_procfs(0x0, 0x0) getdents(r0, &(0x7f0000000180)=""/232, 0xe8) 16:51:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:38 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='\x00') exit(0x0) fstat(r0, &(0x7f0000000280)) 16:51:38 executing program 1: r0 = syz_open_procfs(0x0, 0x0) getdents(r0, &(0x7f0000000180)=""/232, 0xe8) 16:51:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(0xffffffffffffffff, &(0x7f0000000180)=""/232, 0xe8) getdents(r0, 0x0, 0x0) 16:51:38 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r2, 0x8, r0) dup2(r2, r3) tkill(r0, 0x16) 16:51:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0x0) 16:51:38 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(0xffffffffffffffff, &(0x7f0000000180)=""/232, 0xe8) 16:51:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(0xffffffffffffffff, &(0x7f0000000180)=""/232, 0xe8) getdents(r0, 0x0, 0x0) 16:51:38 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, 0x0, 0x0, 0x0) 16:51:38 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(0xffffffffffffffff, &(0x7f0000000180)=""/232, 0xe8) 16:51:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, 0x0, 0x0) getdents(r0, 0x0, 0x0) 16:51:39 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:39 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r0, 0x16) 16:51:39 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') 16:51:39 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(0xffffffffffffffff, &(0x7f0000000180)=""/232, 0xe8) 16:51:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, 0x0, 0x0, 0x0) 16:51:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, 0x0, 0x0) getdents(r0, 0x0, 0x0) 16:51:39 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, 0x0, 0x0) 16:51:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, 0x0, 0x0) getdents(r0, 0x0, 0x0) 16:51:39 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:39 executing program 0: 16:51:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, 0x0, 0x0, 0x0) 16:51:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, &(0x7f0000000180)=""/232, 0xe8) getdents(0xffffffffffffffff, 0x0, 0x0) 16:51:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TIOCGLCKTRMIOS(r3, 0x89f0, 0x0) 16:51:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, 0x0, 0x0) 16:51:42 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, &(0x7f0000000180)=""/232, 0xe8) getdents(0xffffffffffffffff, 0x0, 0x0) 16:51:42 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r0, 0x16) 16:51:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) dup2(r1, r0) 16:51:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, &(0x7f0000000180)=""/232, 0xe8) getdents(0xffffffffffffffff, 0x0, 0x0) 16:51:42 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 16:51:42 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x0, 0xb}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, 0x0, 0x0) 16:51:42 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000440)='threaded\x00', 0xfffffc5d) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) 16:51:43 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x0, 0xb}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) ioctl$TIOCGLCKTRMIOS(r3, 0x89f0, 0x0) 16:51:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @ioapic={0x4000, 0x0, 0xaf70}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:51:43 executing program 3: 16:51:43 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x0, 0xb}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:45 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r0, 0x16) 16:51:45 executing program 3: 16:51:45 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:45 executing program 0: 16:51:45 executing program 1: 16:51:45 executing program 5: 16:51:45 executing program 0: 16:51:45 executing program 5: 16:51:45 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x2141443, 0x0) acct(&(0x7f0000000000)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) 16:51:45 executing program 1: mlockall(0x3) 16:51:45 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:46 executing program 0: setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x156) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x0, &(0x7f0000000000)=ANY=[], 0x0}, 0x48) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) fcntl$getflags(r0, 0x401) socketpair$unix(0x1, 0x800000000000005, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r1, 0x3}, 0x48) unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000020000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) [ 300.388769][ T26] kauditd_printk_skb: 62 callbacks suppressed [ 300.388787][ T26] audit: type=1804 audit(1553705506.009:103): pid=11806 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir596238941/syzkaller.fRLI70/207/file0" dev="sda1" ino=17023 res=1 [ 300.429432][T11806] Process accounting resumed [ 300.494911][T11806] Process accounting resumed 16:51:48 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:51:48 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0505405, &(0x7f0000000080)={{0x0, 0x2}}) 16:51:48 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="6a64538ec89c290fed92bfe97492f161c3913b411f938a52"], 0x18) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000500), 0x0) clock_getres(0xcde45c66b6d30e51, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x800, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000400)={0x0, 0x6, 0x3f, [], 0x0}) socket$tipc(0x1e, 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) getuid() r1 = semget(0xffffffffffffffff, 0x3, 0x0) semget(0x2, 0x2, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000380)=[0x49]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) semctl$GETVAL(r1, 0x0, 0xc, &(0x7f0000000540)=""/218) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) uselib(0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0}, 0xa0) 16:51:48 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r2, 0x8, r0) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r0, 0x16) 16:51:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5457, &(0x7f0000000000)) 16:51:48 executing program 0: setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x156) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x0, &(0x7f0000000000)=ANY=[], 0x0}, 0x48) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) fcntl$getflags(r0, 0x401) socketpair$unix(0x1, 0x800000000000005, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r1, 0x3}, 0x48) unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000020000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 16:51:49 executing program 5: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_getres(0xcde45c66b6d30e51, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x800, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) getuid() r1 = semget(0xffffffffffffffff, 0x3, 0x0) semget(0x2, 0x2, 0x3d8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) semctl$GETVAL(r1, 0x0, 0xc, &(0x7f0000000540)=""/218) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video0\x00', 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) uselib(0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0}, 0xa0) 16:51:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5457, &(0x7f0000000000)) 16:51:49 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 16:51:49 executing program 3: creat(&(0x7f00000004c0)='./bus\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:51:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5457, &(0x7f0000000000)) 16:51:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:51:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5401, &(0x7f0000000000)) 16:51:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x402c542c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e}) 16:51:49 executing program 0: setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x156) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x0, &(0x7f0000000000)=ANY=[], 0x0}, 0x48) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) fcntl$getflags(r0, 0x401) socketpair$unix(0x1, 0x800000000000005, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r1, 0x3}, 0x48) unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000020000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 16:51:52 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r2, 0x8, r0) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r0, 0x16) 16:51:52 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(0x0, 0x0) lstat(0x0, 0x0) stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000300)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 16:51:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:51:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:51:52 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 16:51:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x400, &(0x7f00000002c0)={[{@force='force'}, {@nls={'nls', 0x3d, 'cp950'}}, {@force='force'}, {@nodecompose='nodecompose'}]}) 16:51:52 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x2, 0x0, 0x0, &(0x7f0000000800)}) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) 16:51:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:51:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x5, 0x402000) open(&(0x7f0000000040)='./file0\x00', 0x2141443, 0x0) acct(&(0x7f0000000000)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000000c0)={0x800, 0x1, 0x1, 0x2, 0x13, 0x4fe, 0xe905, 0xe34, 0x5, 0x9, 0x1, 0x7}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x40000, 0x0, @loopback}, {0xa, 0x1, 0x0, @dev}}}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_dev$media(0x0, 0x5c, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000480), 0x0) [ 306.661120][T11978] hfsplus: unable to find HFS+ superblock 16:51:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:51:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x400, &(0x7f00000002c0)={[{@force='force'}, {@nls={'nls', 0x3d, 'cp950'}}, {@force='force'}, {@nodecompose='nodecompose'}]}) 16:51:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:51:55 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_ROPEN(r1, 0x0, 0x0) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r2, 0x8, r0) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r0, 0x16) 16:51:55 executing program 0: creat(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000000)='-27.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 16:51:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:51:55 executing program 5: syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x1ff, 0x2) 16:51:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:51:55 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 309.555078][T12033] 9pnet_virtio: no channels available for device -27.0.0.1 16:51:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 16:51:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) [ 309.598554][T12039] 9pnet_virtio: no channels available for device -27.0.0.1 16:51:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) 16:51:55 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f00000000c0), 0x0}, 0x18) 16:51:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:51:55 executing program 0: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="6a64538ec89c290fed92bfe97492f161c3913b411f938a52"], 0x18) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x800, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000400)={0x0, 0x6, 0x3f, [], 0x0}) socket$tipc(0x1e, 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) getuid() semget(0xffffffffffffffff, 0x3, 0x0) semget(0x2, 0x2, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000380)=[0x49]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000540)=""/218) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video0\x00', 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) uselib(0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0}, 0xa0) 16:51:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000005c0)) getgroups(0x0, 0x0) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) geteuid() getgroups(0x0, 0x0) getuid() fstat(r1, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000900)={{{@in=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000c00)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) fstat(r0, &(0x7f0000000d00)) getgid() mount$9p_unix(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0xc0044dff, &(0x7f00000002c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:51:58 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r2, 0x8, r0) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r0, 0x16) 16:51:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) 16:51:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:51:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xbb) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x41e, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x10000, &(0x7f0000001480)={[{@nouid32='nouid32'}, {@dioread_lock='dioread_lock'}], [{@audit='audit'}, {@hash='hash'}]}) openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 16:51:58 executing program 0: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="6a64538ec89c290fed92bfe97492f161c3913b411f938a52"], 0x18) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x800, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000400)={0x0, 0x6, 0x3f, [], 0x0}) socket$tipc(0x1e, 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) getuid() semget(0xffffffffffffffff, 0x3, 0x0) semget(0x2, 0x2, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000380)=[0x49]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000540)=""/218) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video0\x00', 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) uselib(0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0}, 0xa0) 16:51:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) [ 312.825812][T12090] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 16:51:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) 16:51:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000005c0)) getgroups(0x0, 0x0) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) geteuid() getgroups(0x0, 0x0) getuid() fstat(r1, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000900)={{{@in=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000c00)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) fstat(r0, &(0x7f0000000d00)) getgid() mount$9p_unix(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0xc0044dff, &(0x7f00000002c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:51:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) 16:51:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:51:58 executing program 5: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="6a64538ec89c290fed92bfe97492f161c3913b411f938a52"], 0x18) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x800, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000400)={0x0, 0x6, 0x3f, [], 0x0}) socket$tipc(0x1e, 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) getuid() semget(0xffffffffffffffff, 0x3, 0x0) semget(0x2, 0x2, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000380)=[0x49]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000540)=""/218) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video0\x00', 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) uselib(0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0}, 0xa0) 16:51:58 executing program 0: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="6a64538ec89c290fed92bfe97492f161c3913b411f938a52"], 0x18) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x800, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000400)={0x0, 0x6, 0x3f, [], 0x0}) socket$tipc(0x1e, 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) getuid() semget(0xffffffffffffffff, 0x3, 0x0) semget(0x2, 0x2, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000380)=[0x49]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000540)=""/218) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video0\x00', 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) uselib(0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0}, 0xa0) 16:51:59 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x16) 16:51:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:51:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) [ 313.745630][T12098] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 16:51:59 executing program 2: 16:51:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x14, 0x1, 0x3, 0xffffffffffffffff}, 0x14}}, 0x0) 16:51:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:51:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:51:59 executing program 5: 16:51:59 executing program 5: 16:51:59 executing program 0: 16:51:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:51:59 executing program 5: 16:52:02 executing program 0: 16:52:02 executing program 2: 16:52:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:02 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x16) 16:52:02 executing program 5: 16:52:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:52:02 executing program 0: 16:52:02 executing program 2: 16:52:02 executing program 5: 16:52:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:52:02 executing program 5: 16:52:02 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001580)='./file0\x00', &(0x7f0000001540)='cgroup2\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f00000012c0)='./file0\x00', 0x80000009) 16:52:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:52:02 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$SG_GET_NUM_WAITING(r0, 0x2286, &(0x7f00000000c0)) [ 317.118241][T12201] sg_write: data in/out 1996488668/78 bytes for SCSI command 0x0-- guessing data in; [ 317.118241][T12201] program syz-executor.0 not setting count and/or reply_len properly [ 317.148933][T12201] sg_write: data in/out 1996488668/78 bytes for SCSI command 0x0-- guessing data in; [ 317.148933][T12201] program syz-executor.0 not setting count and/or reply_len properly 16:52:05 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r1, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x16) 16:52:05 executing program 5: memfd_create(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) uname(0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000440)) sendfile(r0, r0, 0x0, 0x2000005) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'netdevsim0\x00'}) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 16:52:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:52:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1006}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x25, 0xfa00, {{0xa, 0x4e24, 0x3ff, @empty, 0x7dd7}, {0xa, 0x4e21, 0x3, @ipv4={[], [], @remote}, 0x1}, 0xffffffffffffffff, 0x7}}, 0x12d) 16:52:05 executing program 0: ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/91, 0x5b) 16:52:05 executing program 0: unshare(0x6000600) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) futex(&(0x7f00000006c0), 0x0, 0x100002, 0x0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x20a000, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000180)=@buf={0x64, &(0x7f0000000300)="64322fe66cb62a6e7bf74387f7b6dd4c08d1c5c677ba031d8bd67e6e7dbf4427bd991becba7e51cd98bb141463f0104c11cc274ed473ca79b7f3a0f9283e4988532e573ed8ce9c7ba423128c7c2f910308aaa2e045722677aa222ed9aa859d65978065b4"}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_raw(r2, &(0x7f0000000140)={0x1d, r3}, 0x10) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0) socket$pptp(0x18, 0x1, 0x2) setsockopt(r2, 0x65, 0x1, &(0x7f0000000080), 0x1d0) close(r2) unshare(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000600)={0x13, 0x10, 0xfa00, {&(0x7f0000000400)}}, 0x18) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, 0x0, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, &(0x7f0000000100)) 16:52:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:52:05 executing program 2: 16:52:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) [ 319.938390][T12221] print_req_error: I/O error, dev loop0, sector 0 flags 80700 16:52:05 executing program 5: 16:52:05 executing program 2: 16:52:08 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:52:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:52:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:08 executing program 5: 16:52:08 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) close(r0) 16:52:08 executing program 0: unshare(0x6000600) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) futex(&(0x7f00000006c0), 0x0, 0x100002, 0x0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x20a000, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000180)=@buf={0x64, &(0x7f0000000300)="64322fe66cb62a6e7bf74387f7b6dd4c08d1c5c677ba031d8bd67e6e7dbf4427bd991becba7e51cd98bb141463f0104c11cc274ed473ca79b7f3a0f9283e4988532e573ed8ce9c7ba423128c7c2f910308aaa2e045722677aa222ed9aa859d65978065b4"}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_raw(r2, &(0x7f0000000140)={0x1d, r3}, 0x10) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0) socket$pptp(0x18, 0x1, 0x2) setsockopt(r2, 0x65, 0x1, &(0x7f0000000080), 0x1d0) close(r2) unshare(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000600)={0x13, 0x10, 0xfa00, {&(0x7f0000000400)}}, 0x18) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, 0x0, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, &(0x7f0000000100)) 16:52:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:52:08 executing program 5: unshare(0x6000600) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) futex(&(0x7f00000006c0), 0x0, 0x100002, 0x0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x20a000, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000180)=@buf={0x64, &(0x7f0000000300)="64322fe66cb62a6e7bf74387f7b6dd4c08d1c5c677ba031d8bd67e6e7dbf4427bd991becba7e51cd98bb141463f0104c11cc274ed473ca79b7f3a0f9283e4988532e573ed8ce9c7ba423128c7c2f910308aaa2e045722677aa222ed9aa859d65978065b4"}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_raw(r2, &(0x7f0000000140)={0x1d, r3}, 0x10) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0) socket$pptp(0x18, 0x1, 0x2) setsockopt(r2, 0x65, 0x1, &(0x7f0000000080), 0x1d0) close(r2) unshare(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000600)={0x13, 0x10, 0xfa00, {&(0x7f0000000400)}}, 0x18) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, 0x0, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, &(0x7f0000000100)) 16:52:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398516f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup2(r1, r0) 16:52:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:52:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:52:09 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:52:09 executing program 0: add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) 16:52:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:52:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398516f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup2(r1, r0) 16:52:09 executing program 5: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) splice(r1, &(0x7f0000000040)=0x8000, r0, 0x0, 0x2, 0x0) 16:52:09 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000026000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) 16:52:09 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:52:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) [ 323.965022][T12324] binder: BC_ATTEMPT_ACQUIRE not supported 16:52:09 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000540)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) [ 324.007410][T12329] binder: BC_ATTEMPT_ACQUIRE not supported 16:52:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000e40)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) shutdown(0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) getsockopt$inet_mreq(r3, 0x0, 0x0, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 324.053812][T12324] binder: 12321:12324 ioctl c0306201 200000c0 returned -22 [ 324.076784][T12329] binder: 12321:12329 ioctl c0306201 200000c0 returned -22 16:52:10 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r0, 0x8, 0x0) fcntl$setsig(r0, 0xa, 0x12) dup2(r0, r1) tkill(0x0, 0x16) 16:52:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:52:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000700)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)={[{@fat=@check_strict='check=strict'}, {@fat=@discard='discard'}]}) 16:52:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:10 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) [ 324.695034][T12358] FAT-fs (loop0): bogus number of reserved sectors [ 324.721882][T12362] binder: BC_ATTEMPT_ACQUIRE not supported 16:52:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0xc0044dff, &(0x7f00000002c0)) 16:52:10 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 324.754746][T12358] FAT-fs (loop0): Can't find a valid FAT filesystem [ 324.784319][T12362] binder: 12354:12362 ioctl c0306201 200000c0 returned -22 16:52:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) [ 324.838319][T12358] FAT-fs (loop0): bogus number of reserved sectors [ 324.845056][T12358] FAT-fs (loop0): Can't find a valid FAT filesystem 16:52:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) [ 324.970418][T12385] binder: BC_ATTEMPT_ACQUIRE not supported [ 325.042493][T12385] binder: 12382:12385 ioctl c0306201 200000c0 returned -22 16:52:11 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r0, 0x8, 0x0) fcntl$setsig(r0, 0xa, 0x12) dup2(r0, r1) tkill(0x0, 0x16) 16:52:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0xc0044dff, &(0x7f00000002c0)) 16:52:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000700)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)={[{@fat=@check_strict='check=strict'}, {@fat=@discard='discard'}]}) 16:52:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:11 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 325.594977][T12406] binder: BC_ATTEMPT_ACQUIRE not supported [ 325.610400][T12403] FAT-fs (loop0): bogus number of reserved sectors 16:52:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0x80045300, 0x0) [ 325.639589][T12406] binder: 12399:12406 ioctl c0306201 200000c0 returned -22 [ 325.656931][T12403] FAT-fs (loop0): Can't find a valid FAT filesystem 16:52:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0xc0044dff, &(0x7f00000002c0)) 16:52:11 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0x80045300, 0x0) 16:52:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000700)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)={[{@fat=@check_strict='check=strict'}, {@fat=@discard='discard'}]}) [ 325.922089][T12433] binder: BC_ATTEMPT_ACQUIRE not supported [ 325.953967][T12433] binder: 12427:12433 ioctl c0306201 200000c0 returned -22 [ 325.982334][T12438] FAT-fs (loop0): bogus number of reserved sectors [ 325.997401][T12438] FAT-fs (loop0): Can't find a valid FAT filesystem 16:52:12 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r0, 0x8, 0x0) fcntl$setsig(r0, 0xa, 0x12) dup2(r0, r1) tkill(0x0, 0x16) 16:52:12 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:52:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0x80045300, 0x0) 16:52:12 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000700)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)={[{@fat=@check_strict='check=strict'}, {@fat=@discard='discard'}]}) [ 326.501561][T12453] binder: BC_ATTEMPT_ACQUIRE not supported [ 326.516895][T12456] FAT-fs (loop0): bogus number of reserved sectors [ 326.538468][T12453] binder: 12446:12453 ioctl c0306201 200000c0 returned -22 16:52:12 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:12 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x101502, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:52:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0x80045300, 0x0) [ 326.546360][T12456] FAT-fs (loop0): Can't find a valid FAT filesystem 16:52:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:12 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)={[{@fat=@check_strict='check=strict'}, {@fat=@discard='discard'}]}) 16:52:12 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x101502, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) [ 326.701751][T12472] binder: BC_ATTEMPT_ACQUIRE not supported [ 326.733713][T12472] binder: 12468:12472 ioctl c0306201 200000c0 returned -22 16:52:13 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1040, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:52:13 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0x80045300, 0x0) 16:52:13 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:13 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x101502, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:52:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:13 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)={[{@fat=@check_strict='check=strict'}, {@fat=@discard='discard'}]}) [ 327.416690][T12495] binder: BC_ATTEMPT_ACQUIRE not supported [ 327.422587][T12495] binder: 12493:12495 ioctl c0306201 200000c0 returned -22 16:52:13 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:13 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) 16:52:13 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0x80045300, 0x0) 16:52:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:13 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)={[{@fat=@check_strict='check=strict'}, {@fat=@discard='discard'}]}) 16:52:13 executing program 1: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0xc0044dff, &(0x7f00000002c0)) [ 327.610760][T12514] binder: BC_ATTEMPT_ACQUIRE not supported [ 327.642445][T12514] binder: 12513:12514 ioctl c0306201 200000c0 returned -22 16:52:13 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:52:13 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:13 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0x80045300, 0x0) 16:52:13 executing program 1: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0xc0044dff, &(0x7f00000002c0)) [ 327.824857][T12539] binder: BC_ATTEMPT_ACQUIRE not supported [ 327.845788][T12539] binder: 12531:12539 ioctl c0306201 200000c0 returned -22 16:52:13 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0x80045300, 0x0) 16:52:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000700)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)={[{@fat=@check_strict='check=strict'}, {@fat=@discard='discard'}]}) 16:52:13 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:13 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:52:13 executing program 1: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0xc0044dff, &(0x7f00000002c0)) 16:52:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000700)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)={[{@fat=@check_strict='check=strict'}, {@fat=@discard='discard'}]}) 16:52:13 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0x80045300, 0x0) 16:52:13 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:13 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, 0x0) 16:52:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:13 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:52:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000700)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)={[{@fat=@check_strict='check=strict'}, {@fat=@discard='discard'}]}) 16:52:14 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0x80045300, 0x0) 16:52:14 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:14 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, 0x0) 16:52:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:14 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0x80045300, 0x0) 16:52:14 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000700)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:52:14 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, 0x0) [ 328.714161][T12623] binder: BC_ATTEMPT_ACQUIRE not supported [ 328.743272][T12624] FAT-fs (loop0): bogus number of reserved sectors 16:52:14 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0x80045300, 0x0) 16:52:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) [ 328.764189][T12623] binder: 12618:12623 ioctl c0306201 200000c0 returned -22 [ 328.786554][T12624] FAT-fs (loop0): Can't find a valid FAT filesystem 16:52:17 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:52:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet6_tcp_int(r0, 0x6, 0x11, &(0x7f0000000140)=0x7, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x1) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0xffffffe3, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000180)={0xffff, 0xffff, 0x7, 0x0, 0x9c7, 0x3}) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) getresgid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/148, 0x94}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f00000000c0)={0x1f, 0x8, 0x0, 0x2, 0x14}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x2b, 'io'}, {0x0, 'memory'}]}, 0xc) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000240)) syz_genetlink_get_family_id$tipc2(0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(0xffffffffffffffff, &(0x7f0000000380), 0xfffffffe) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r3, &(0x7f0000000480), 0x1000000000000237, 0x0) signalfd4(r3, &(0x7f00000000c0)={0x1ff}, 0x8, 0x80800) 16:52:17 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000700)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 331.433524][T12647] binder: BC_ATTEMPT_ACQUIRE not supported 16:52:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) [ 331.474779][T12648] FAT-fs (loop0): bogus number of reserved sectors [ 331.491075][T12647] binder: 12644:12647 ioctl c0306201 200000c0 returned -22 [ 331.513748][T12648] FAT-fs (loop0): Can't find a valid FAT filesystem 16:52:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:17 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000700)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:52:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) [ 331.838517][T12675] binder: BC_ATTEMPT_ACQUIRE not supported [ 331.886796][T12676] FAT-fs (loop0): bogus number of reserved sectors [ 331.908376][T12675] binder: 12671:12675 ioctl c0306201 200000c0 returned -22 [ 331.922463][T12676] FAT-fs (loop0): Can't find a valid FAT filesystem 16:52:20 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:52:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:20 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x200000010, &(0x7f0000000080)=0x5, 0x191) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x40000000000037f, 0x0) 16:52:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:20 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000700)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)={[{@fat=@check_strict='check=strict'}]}) [ 334.534142][T12696] FAT-fs (loop0): bogus number of reserved sectors [ 334.571993][T12690] binder: BC_ATTEMPT_ACQUIRE not supported 16:52:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:20 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 334.587894][T12690] binder: 12688:12690 ioctl c0306201 200000c0 returned -22 [ 334.595912][T12696] FAT-fs (loop0): Can't find a valid FAT filesystem 16:52:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000700)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)={[{@fat=@check_strict='check=strict'}]}) 16:52:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) [ 334.809404][T12713] binder: BC_ATTEMPT_ACQUIRE not supported [ 334.815284][T12713] binder: 12711:12713 ioctl c0306201 200000c0 returned -22 [ 334.828559][T12719] FAT-fs (loop0): bogus number of reserved sectors [ 334.842745][T12719] FAT-fs (loop0): Can't find a valid FAT filesystem 16:52:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:23 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x16) 16:52:23 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000700)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)={[{@fat=@check_strict='check=strict'}]}) 16:52:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:23 executing program 1: setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x10000, 0x5}]}, 0xc, 0x3) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') ioctl$void(r0, 0xc0045c79) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) timerfd_create(0x7, 0x80005) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) timerfd_create(0x0, 0x80000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000005c0)=0x14) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x40010000, 0x0) r2 = getpgid(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) tgkill(r2, 0x0, 0x2b) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000140)={0x0, 0x7}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000)=0x13, 0x4) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) [ 337.624052][T12744] FAT-fs (loop0): bogus number of reserved sectors [ 337.653186][T12742] binder: BC_ATTEMPT_ACQUIRE not supported 16:52:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) [ 337.673246][T12744] FAT-fs (loop0): Can't find a valid FAT filesystem [ 337.691892][T12742] binder: 12734:12742 ioctl c0306201 200000c0 returned -22 16:52:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:23 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000700)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)={[{@fat=@discard='discard'}]}) 16:52:23 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 338.099112][T12777] FAT-fs (loop0): bogus number of reserved sectors [ 338.136653][T12777] FAT-fs (loop0): Can't find a valid FAT filesystem 16:52:26 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x16) 16:52:26 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:26 executing program 1: setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x10000, 0x5}]}, 0xc, 0x3) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') ioctl$void(r0, 0xc0045c79) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) timerfd_create(0x7, 0x80005) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) timerfd_create(0x0, 0x80000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000005c0)=0x14) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x40010000, 0x0) r2 = getpgid(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) tgkill(r2, 0x0, 0x2b) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000140)={0x0, 0x7}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000000)=0x13, 0x4) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$hfsplus(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 16:52:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c12") r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:26 executing program 0: setxattr$security_capability(0x0, &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x3) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') ioctl$void(0xffffffffffffffff, 0xc0045c79) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 16:52:26 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c12") r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:26 executing program 0: 16:52:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c12") r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:26 executing program 0: [ 340.900318][T12817] binder: BC_ATTEMPT_ACQUIRE not supported [ 340.920488][T12817] binder: 12812:12817 ioctl c0306201 200000c0 returned -22 16:52:29 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(r0, 0x16) 16:52:29 executing program 1: 16:52:29 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:29 executing program 0: 16:52:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188") r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:29 executing program 0: 16:52:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188") r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:29 executing program 1: [ 343.722865][T12837] binder: BC_ATTEMPT_ACQUIRE not supported [ 343.755699][T12837] binder: 12835:12837 ioctl c0306201 200000c0 returned -22 16:52:29 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:29 executing program 0: [ 343.978295][T12860] binder: BC_ATTEMPT_ACQUIRE not supported [ 344.011003][T12860] binder: 12856:12860 ioctl c0306201 200000c0 returned -22 16:52:32 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:52:32 executing program 1: 16:52:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188") r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:32 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:32 executing program 0: 16:52:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:32 executing program 0: 16:52:32 executing program 1: [ 346.795709][T12876] binder: BC_ATTEMPT_ACQUIRE not supported [ 346.830537][T12876] binder: 12872:12876 ioctl c0306201 200000c0 returned -22 16:52:32 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b0") r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:32 executing program 0: [ 346.952330][T12890] binder: BC_ATTEMPT_ACQUIRE not supported [ 346.974514][T12890] binder: 12889:12890 ioctl c0306201 200000c0 returned -22 16:52:35 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:52:35 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:35 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000080)="fe", 0x1) 16:52:35 executing program 0: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:52:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b0") r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:35 executing program 1: r0 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) lseek(r0, 0x0, 0x0) 16:52:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b0") r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:35 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 349.890870][T12915] binder: BC_ATTEMPT_ACQUIRE not supported [ 349.912091][T12915] binder: 12905:12915 ioctl c0306201 200000c0 returned -22 16:52:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000100)={@multicast2, @loopback}, 0x8) 16:52:35 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chdir(&(0x7f0000000440)='./file0\x00') open(&(0x7f0000000180)='./file0\x00', 0x40, 0xfffffffffffffffc) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) [ 350.088420][T12933] binder: BC_ATTEMPT_ACQUIRE not supported [ 350.122780][T12933] binder: 12928:12933 ioctl c0306201 200000c0 returned -22 16:52:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') read(r0, 0x0, 0x0) 16:52:38 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:52:38 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0xfffffffffffffffd}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) getsockopt$inet_buf(r0, 0x0, 0x24, &(0x7f0000000380)=""/153, &(0x7f0000000500)=0xc613301ca4c9143e) getpgrp(0x0) timer_create(0x1, &(0x7f0000000100)={0x0, 0xe}, 0x0) timer_delete(0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000200)) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @rand_addr="2d0be1aa0334b10da0ec57702dbec84b", 0x8000}, 0x1c) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2, 0x0, @rand_addr, 0x80000000000}, 0x1c) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x40800) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) write$P9_RLOPEN(r0, &(0x7f00000000c0)={0x18, 0xd, 0x1}, 0x18) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x3) 16:52:38 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 352.996477][T12965] binder: BC_ATTEMPT_ACQUIRE not supported [ 353.021065][T12965] binder: 12961:12965 ioctl c0306201 200000c0 returned -22 16:52:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget(0x1, 0x0, 0x0) 16:52:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000000)={@remote}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000400)) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x1010, r2, 0x0) getegid() stat(0xfffffffffffffffe, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000440)) geteuid() ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f00000004c0)="d93e0def07d014706475fc92860b6f77b11bca8623361a5ef195367fcd80a76062fdb21a7b31ff161cc91c94b003d025bf27263ebebd04376ea7e1562e2c7dd4b021c83a77c679b5fa512f2a238e44f19f2ae28471535c4eebdfe23f5cf959d05b377a57ce06957778113bf8b969f162c1ed9b8c1a9897e28e2357230a86a48de2060d284211a4ea1b7b3573160ef0793be1d3afa2fc4365593c4d6c3e4b277d6e638f13725759f03d73") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@dev}}, 0x0) getgid() openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000000340), 0x4) write$binfmt_script(r0, 0x0, 0xfffffffffffffce0) [ 353.189462][T12984] binder: BC_ATTEMPT_ACQUIRE not supported [ 353.217095][T12984] binder: 12980:12984 ioctl c0306201 200000c0 returned -22 16:52:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0x80045300, 0x0) 16:52:38 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) [ 353.408044][T13000] binder: BC_ATTEMPT_ACQUIRE not supported [ 353.464344][T13000] binder: 12998:13000 ioctl c0306201 200000c0 returned -22 16:52:41 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x0, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:52:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:41 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_TIMERSLACK(0x1d, 0xff) 16:52:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0x80045300, 0x0) 16:52:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee67, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000000)={@remote}) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000640)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000340), 0x4) write$binfmt_script(r0, 0x0, 0xfffffffffffffce0) [ 356.104606][T13019] binder: BC_ATTEMPT_ACQUIRE not supported 16:52:41 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 356.162922][T13019] binder: 13017:13019 ioctl c0306201 200000c0 returned -22 16:52:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:41 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 356.261796][T13037] binder: BC_ATTEMPT_ACQUIRE not supported [ 356.268709][T13037] binder: 13036:13037 ioctl c0306201 200000c0 returned -22 16:52:42 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000140)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002700) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:52:44 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x0, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:52:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0x80045300, 0x0) 16:52:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee67, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000000)={@remote}) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000640)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000340), 0x4) write$binfmt_script(r0, 0x0, 0xfffffffffffffce0) 16:52:44 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000140)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002700) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:52:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0x80045300, 0x0) 16:52:44 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 16:52:45 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0505405, &(0x7f0000000080)) 16:52:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee67, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000000)={@remote}) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000640)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000340), 0x4) write$binfmt_script(r0, 0x0, 0xfffffffffffffce0) 16:52:45 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) [ 359.408679][T13095] binder: 13094:13095 ioctl c0306201 0 returned -14 [ 359.497835][T13104] binder: 13101:13104 ioctl c0306201 0 returned -14 16:52:47 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x0, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:52:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:47 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 16:52:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398516f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) 16:52:47 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000240)=[@reply={0x4008630a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 16:52:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee67, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000000)={@remote}) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000640)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000340), 0x4) write$binfmt_script(r0, 0x0, 0xfffffffffffffce0) 16:52:47 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 362.221737][T13118] binder: 13113:13118 ioctl c0306201 0 returned -14 [ 362.243555][T13121] binder: BC_ATTEMPT_ACQUIRE not supported [ 362.265110][T13121] binder: 13114:13121 ioctl c0306201 200000c0 returned -22 16:52:47 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r2, 0x0, 0x100000000000e, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x100000000, 0xffffffff}) 16:52:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:48 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:52:48 executing program 1: r0 = socket$packet(0x11, 0x100000000003, 0x300) r1 = dup2(r0, r0) sendmsg$unix(r1, &(0x7f0000000580)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x3}, 0x6e, 0x0, 0x0, &(0x7f0000000540)=[@cred={0x20}], 0x30}, 0x0) 16:52:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) add_key$user(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x6) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 362.825520][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 362.831446][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 363.145614][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 363.151520][ C0] protocol 88fb is buggy, dev hsr_slave_1 16:52:50 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:52:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:50 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:52:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 16:52:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, 0x0, 0x7, 0x0, "4877bb1f56d48eb1fa5fac76a792a929a57f6062b013ec6b7a9ee231ea85a1c7f5c8fdf3bcaf6c5bb203dab4011d7c6096609012d3e979295204ae936681b23832f302a5020f3f6af0b1d2fb5a00eb09"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) 16:52:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) add_key$user(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x6) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 16:52:50 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240), 0x0, 0x0, 0x0}) 16:52:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) add_key$user(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x6) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 16:52:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee67, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000000)={@remote}) stat(0x0, &(0x7f0000000580)) getgid() setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000340), 0x4) 16:52:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:51 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240), 0x0, 0x0, 0x0}) 16:52:51 executing program 5: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240), 0x0, 0x0, 0x0}) [ 365.945588][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 365.951491][ C0] protocol 88fb is buggy, dev hsr_slave_1 16:52:53 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, &(0x7f0000000040)) 16:52:53 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ion\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000000)={0x7}) 16:52:53 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:52:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x200002, 0x0, 0x0) 16:52:53 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r1 = dup2(r0, r0) lseek(r1, 0x0, 0x4) 16:52:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0xc0044dff, &(0x7f00000002c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/wireless\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, 0x0}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 16:52:54 executing program 0: syz_open_dev$usbmon(0x0, 0x0, 0x0) rt_sigsuspend(&(0x7f0000000180), 0x8) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, 0x0) 16:52:54 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, &(0x7f0000000040)) 16:52:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) 16:52:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:52:54 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1008000, 0x0) 16:52:54 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x6f7, 0x0) syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0xff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000001640)='/dev/amidi#\x00', 0x6, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000001780)='/dev/mixer\x00', 0x10001, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000002800)='/dev/dlm_plock\x00', 0x2000, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002900)='/dev/sequencer\x00', 0x4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/vsock\x00', 0x20000, 0x0) io_submit(0x0, 0x2, &(0x7f0000002a40)=[&(0x7f0000001540)={0x0, 0x0, 0x0, 0xe, 0x8, 0xffffffffffffffff, &(0x7f0000000540)="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", 0x1000, 0x5, 0x0, 0x3, 0xffffffffffffff9c}, &(0x7f0000002a00)={0x0, 0x0, 0x0, 0x6, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x8a2c, 0x0, 0x2}]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0xc00000) 16:52:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0xc0044dff, &(0x7f00000002c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:57 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:52:57 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x20a000, 0x0) socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFCONF(r0, 0x8912, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) setsockopt(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) unshare(0x40000400) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, 0x0, &(0x7f00000002c0)) 16:52:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0xc0044dff, &(0x7f00000002c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:57 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1008000, 0x0) 16:52:57 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x6f7, 0x0) syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0xff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000001640)='/dev/amidi#\x00', 0x6, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000001780)='/dev/mixer\x00', 0x10001, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000002800)='/dev/dlm_plock\x00', 0x2000, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002900)='/dev/sequencer\x00', 0x4000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/vsock\x00', 0x20000, 0x0) io_submit(0x0, 0x2, &(0x7f0000002a40)=[&(0x7f0000001540)={0x0, 0x0, 0x0, 0xe, 0x8, 0xffffffffffffffff, &(0x7f0000000540)="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", 0x1000, 0x5, 0x0, 0x3, 0xffffffffffffff9c}, &(0x7f0000002a00)={0x0, 0x0, 0x0, 0x6, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x8a2c, 0x0, 0x2}]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0xc00000) 16:52:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 16:52:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2b9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) [ 371.480453][T13280] IPVS: ftp: loaded support on port[0] = 21 16:52:57 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:57 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1008000, 0x0) 16:52:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@buf) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) socket$pptp(0x18, 0x1, 0x2) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) close(r1) unshare(0x40000400) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)=""/8, &(0x7f0000000100)=0x8) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000600)={0x13, 0x10, 0xfa00, {&(0x7f0000000400)}}, 0x18) pipe(&(0x7f00000001c0)) 16:52:57 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:52:57 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1008000, 0x0) [ 371.888154][T13289] IPVS: ftp: loaded support on port[0] = 21 [ 371.914500][T13304] IPVS: ftp: loaded support on port[0] = 21 16:53:00 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:53:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) io_setup(0x6f7, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000001780)='/dev/mixer\x00', 0x10001, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000002800)='/dev/dlm_plock\x00', 0x2000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/vsock\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{0x0}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) fallocate(r1, 0x11, 0x0, 0x0) 16:53:00 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:00 executing program 5: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1008000, 0x0) 16:53:00 executing program 2: 16:53:00 executing program 2: 16:53:00 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:00 executing program 5: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1008000, 0x0) 16:53:00 executing program 2: 16:53:00 executing program 0: 16:53:00 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:00 executing program 5: syz_mount_image$hfsplus(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1008000, 0x0) 16:53:03 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:53:03 executing program 1: 16:53:03 executing program 2: 16:53:03 executing program 0: 16:53:03 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:03 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', 0x0, 0x0, 0x0, 0x0, 0x1008000, 0x0) 16:53:03 executing program 1: 16:53:03 executing program 0: 16:53:03 executing program 2: 16:53:03 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', 0x0, 0x0, 0x0, 0x0, 0x1008000, 0x0) 16:53:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:03 executing program 0: 16:53:06 executing program 2: ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) syz_genetlink_get_family_id$team(0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r3, 0x89f0, 0x0) 16:53:06 executing program 1: 16:53:06 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:53:06 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', 0x0, 0x0, 0x0, 0x0, 0x1008000, 0x0) 16:53:06 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) 16:53:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:06 executing program 1: mlockall(0x2000000007) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlockall() 16:53:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:06 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) lseek(r0, 0xfffffffffffffffe, 0x3) 16:53:06 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:53:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) [ 380.929595][T13444] hfsplus: unable to find HFS+ superblock 16:53:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) getpgid(0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000300)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e105d77183f320613057ffd7e07900e0413ff26bb45200100000000000003cfe5f0028213ee20600d4ff116eb5", 0x48}], 0x1) 16:53:06 executing program 2: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000180)="1f0000000104fffff15154c007110009f30501000b00034000020000020000", 0x1f) 16:53:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) [ 381.237025][T13471] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 381.360295][T13475] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 381.408649][T13471] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 381.455918][T13475] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 16:53:09 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:53:09 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:53:09 executing program 0: perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x4, 0x6, 0x4, 0x57869354, 0x0, 0x0, 0x69840, 0x0, 0xf915, 0xfffffffffffffff7, 0x80, 0x800, 0x5, 0x7, 0xe148, 0x5e, 0x0, 0x7, 0x6, 0x40, 0x5, 0xfd, 0x1, 0x3f, 0x8f, 0x1000, 0xff, 0x5, 0x8, 0x2, 0x3, 0x4, 0x800, 0x2, 0xd6, 0x400, 0x0, 0xfffffffffffffff8, 0x6, @perf_config_ext={0x0, 0x8}, 0x20, 0x180, 0x5, 0x0, 0x3f, 0xc6}, 0xffffffffffffff9c, 0xc, 0xffffffffffffff9c, 0x2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x81, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 16:53:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'bpq0\x00\x00\x06\xe0\xff\x00\x00\b\x00', 0x1}) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000240)) 16:53:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="a3375f83dd2586651779c2b1dc11", 0x0, 0x6a9}, 0x28) [ 383.782416][T13495] hfsplus: unable to find HFS+ superblock 16:53:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:09 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000380)=@in={0x2, 0x0, @multicast2=0xe0000001}, 0x80, 0x0}, 0x0) 16:53:09 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:53:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:09 executing program 2: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @loopback={0x2}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="b7", 0x1}], 0x1}, 0x0) [ 384.011428][T13518] hfsplus: unable to find HFS+ superblock 16:53:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x6d000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x5}, 0x10) socket$kcm(0x2, 0x0, 0x2) socketpair(0x15, 0x4, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000004c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r1, 0x0, 0x0}, 0x10) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x780, 0x798, 0x8, {"6aa66af537f0dafabe2ae67f87002f8858eb1b7a0ab4e9df2f0208f8d786e823c4e4fd46ff1032936a41ac147601aac4f1ac267ca93a81fa2e4b94210eb139a6b8f849c827c25d434d7b0fd8e3734450ba3f0046d4780b8782bbe843caacc6245a00cc040e4eccee4c6f34dacccd23a4e232df9d75283c08efdbc64a59427a21ab0fd473adde358d5197112c53d90ff4e627cc588d61ebc3cbd6267430074dba8ae360c374740639c2fce6feb692468fb43726c7cf9566f7ddcc3ec0f336d67c38bcf33135c4493985a8929fea0b012a463f354dad235652dbc05bec60591b1719dc29fc242084e1236a745dac233e217e349a0ecc4b2ee3abb5e1843f6c6f698cc645b7afe912ab4e21971edcf8e571f387f1d9ba2f3bbb836114d7f1872420db31c8f74f69fbf56abd16064bcfd450819051d3cc96a2b579227151949ca6202a4b25596a7b0510acc6f449a8475602d9d82f237db816fceba59742cc426f7187a684c6f0b50c37e41488dd3d706e7b048cf998b7982953694bb6e2a6c835bdb1913d6244499d068dc7308b0a58807ee417eeab766635bc7d5b131e1f509eb3be49c053ee06e20da8579937966e6cebea35343580519e54e11aacacd8d285ae86def9157842c11ae17c41db1349b3df31d53fb4e9f1d8e5e632d0c956f13799676c2216964ea7326db70bcec37eaef52dfd9cb591e2aa8468939cacad64355fc32e63aca0a92b33e7b9488f9cd9766b281b0f43149166f724d2b4e883737956ac197c6c7ed10f3d7b52faec11c4821072b00a4346f4841591967c95869bc1f7f452f49d2605e0f691f4307a15e02741a775b93d6481a5a1a059762d6e0e81c1a944ce661457b2d426d2241e42fccbc75da3208e7bd9953b39ed0c5f642693336001d3f8a8ea2b9395165f2de4518c2669d70ee69cc643cb5121e93e3c43fe39762edf156dd4a982378d34f69163a059f3bf9095cbfa8e65c8919b64e35c92c6ecb63a43844d40ebc415f4797afc7668e1657c6e3db54ab1f6a7c69a1e8d6a5fee0548ed931e7f297cf85e24a365e61dc134c4af7881117308942b3bd6113838d98dc01129981c6d814e91523ff4f3ea97eaf5324206a10900267a3cc67356ae281b4c45085ecaeba0b7729ef3849dbf96e2672990d524ebfdd73e5a462cdc9bec9bac2f63cad6a87f05f329b9c5bc3f2b8e61c1e855e88cac73786fe78449b408ed2d6827772df3c338775326537f75499a1e89964f1236363baa16a6671ca7f9269b6ff877cefff950f4582f387615c3b2d59f8f4aa0a5b60667f3c98a71b7718f317861a2d6ef92466b92869245d812a6515dcd83d09528cfd0013900d528ff7786804bd7317279516fd8d452d89753e54ef1dcada0a9367af89b41afb928fa1ec7c1b8dbbcd7792632d0f29f0c4f76dcb0be53c8dafc8590167d744119a4668187b3b65a8fbacaa1cbc2a942fc226e0ec34163c8ecfe872efa6a25c5a279c990ff6d740320828542028d867a52878367d03637e043b11d7081c88f2a1e052cb8f8fd78370792a308a502d9f422099989513e120e4f3e3b1cb2a18dee247f6d8f3a016b1489d046f40214495df072cf183141f98d6e52c67720fbc69fa92c8fc5069c5ba68c8e883127bbdb29778f580369e1647c8c609575e57af3f0306b68b84ffca470403299e6817dd4f1cc192d2acd95f9074377490974d9a00854ee1ce00d66b58058f7674dee13fd04c732cc2006015ae0136b5f85b0d4fe6885389826def7dc084035bf95a8dcecced5230008056487fba70df962656e14f1d9837e56f21e93fc4b128aba87a7e1159b0c64f71653ad44bf574c6606ae1f3c09e9d9a852478ea3b3b0147ca775669c2d84df45fe3d23bfb516294cdc201bf1d9418dcc546355b60ac0a97c94242e7647df3af168717f89aa1026cf437b13112dfc97599a7bd62f7bd08ccd6ff19581d9bb6a62c27d080c1d89f6c031c9889f0b188d1c5e39a0c3790f093816137f645f400ef6ef97727f918a65c78c6de8b7c4642b0433ccac3a250c65899e9e3faf2f5cf9c97938528dfdeca5125568011da5d5075a93f40d26fa06afc15c9a2d1f7d9d883a6aa3b5c8b78f321164957a19acc158678ffe7829df0cbb53dde00c757d49eb6dc66e417cadf73c278971675d8547b3318067065deb395464f4eb0159c9eb29cfb3c0a2639173e25abbc0a8b63d9b84ea77622bdfb639a8bb3fda01f7d35cce28992ef42e4de92b0c17e8241fc427a3a606b718df972e3d5b1dcfc027414f1e3e8aa72c30b39050bff90866481aae61c2a41ecb0e4475b2f191ecbd10349b0a5a9afd43c32d03ff873794b638fba24b69d03781288ea3ccf94db843da278f805e52951ae375967f8a01a63e9e698bf806f467ce7a1134920ac965620ac15ded7c4345dbfb796028182b2c8d632f9deb34cbe44cdb5e44e1a8269fc6f18f74ee389c8c827c78c07ecfbc223ad74b0c628fd7c549425640c15acc3fbef2a904c4c248f47b04897581a1cdd0d03de0e5013a6a6bdf81ae46ddbda45d623477b27280c77a6e4ad53542c93e94f35547e6cc37366840fb5bf8c1d06eb8c570e90abb8aebd2423e4b16be598f3e4286306b83ad1f753735640d7fd3e903b6f943c430a80a8eb2c0ed9091a2ca31c199abbfa6115c1ea477423d4bd867db1e01547ea5781552638b6690dbb8a0b029c7f90e"}}, {0x0, "874077b511c4af7b0e393e67a3ee5c371277446e168109163374ae3ce5d6d5f577349b1e8dcc085440ea05c13989178750be398a05d8ba8255c0428c2a2abcbb18fd1877f0419f7df5cdcf45c10cbe049ae5ec6d4bde738d6b6bd33aac24cd7aaa2c648364bb9a7cf82bed2a48e90251af020d826596d8d3888d666bc7d6496af0a0145d3bc58ccf5a498ef892dbe7082381d4ed5e0257f658cc0d5e892e2e97e98b660f43ddb3eb94d6599b04dabeded774b69afecdcad24056f45e31ab72b570492c89acaf1f767a360dc9d7cf3be4dd7a9f4aa6f417175adf29f5c5dd3447e3b651f607e6a7d5e8c59da2f25f"}}, 0x0, 0x888}, 0x20) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x0, 0x0, 0x0) 16:53:12 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:53:12 executing program 5: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x800, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000400)={0x0, 0x6, 0x3f, [], &(0x7f00000003c0)=0x3}) socket$tipc(0x1e, 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) getuid() r1 = semget(0xffffffffffffffff, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) semctl$GETVAL(r1, 0x0, 0xc, &(0x7f0000000540)=""/218) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video0\x00', 0x2, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0}, 0xa0) 16:53:12 executing program 0: 16:53:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:12 executing program 1: 16:53:12 executing program 2: 16:53:12 executing program 1: 16:53:12 executing program 0: 16:53:12 executing program 2: 16:53:12 executing program 1: 16:53:12 executing program 5: 16:53:12 executing program 2: 16:53:15 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:53:15 executing program 0: 16:53:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:15 executing program 2: 16:53:15 executing program 5: 16:53:15 executing program 1: 16:53:15 executing program 2: 16:53:15 executing program 5: 16:53:15 executing program 0: 16:53:15 executing program 1: 16:53:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:15 executing program 5: 16:53:18 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:53:18 executing program 2: 16:53:18 executing program 0: 16:53:18 executing program 1: 16:53:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:18 executing program 5: 16:53:18 executing program 5: 16:53:18 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {r1, 0x108}, {r3, 0x20}, {0xffffffffffffffff, 0x2}, {r2, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) r1 = dup2(r0, r0) sendto$inet(r1, &(0x7f00000006c0)="50893f9085eb9f57cdb68c6dda4997459548526d99bb882c", 0x18, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000940)={&(0x7f0000000800), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20044041}, 0x800) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) shutdown(r0, 0x1000000000001) 16:53:18 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000000c0), 0x4) 16:53:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:18 executing program 5: syz_open_dev$usbmon(0x0, 0x0, 0x2) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) 16:53:21 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:53:21 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {r1, 0x108}, {r3, 0x20}, {0xffffffffffffffff, 0x2}, {r2, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:21 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x100000003, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) r2 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000140)=""/114) recvmmsg(r0, &(0x7f0000001cc0), 0x4000052, 0x10102, &(0x7f0000001540)={0x0, r1+10000000}) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 16:53:21 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) mkdir(0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x0, 0x70bd27, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x24000004}, 0x4000000) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xb00}}) 16:53:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:21 executing program 5: r0 = gettid() clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, r1+10000000}, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1004000000016) 16:53:21 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {r1, 0x108}, {r3, 0x20}, {0xffffffffffffffff, 0x2}, {r2, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:21 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {r1, 0x108}, {r3, 0x20}, {0xffffffffffffffff, 0x2}, {r2, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:22 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {r1, 0x108}, {r3, 0x20}, {0xffffffffffffffff, 0x2}, {r2, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:22 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) mkdir(0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x0, 0x70bd27, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x24000004}, 0x4000000) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xb00}}) 16:53:24 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:53:24 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {r1, 0x108}, {r3, 0x20}, {0xffffffffffffffff, 0x2}, {r2, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:24 executing program 5: r0 = gettid() clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, r1+10000000}, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1004000000016) 16:53:24 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x100000003, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) r2 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000140)=""/114) recvmmsg(r0, &(0x7f0000001cc0), 0x4000052, 0x10102, &(0x7f0000001540)={0x0, r1+10000000}) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 16:53:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@uqnoenforce='uqnoenforce'}], [{@uid_lt={'uid<'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:24 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ppoll(&(0x7f0000000280)=[{}, {r1, 0x108}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x2}, {r2, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) [ 399.249674][T13702] XFS (loop0): unknown mount option [uid<00000000000000000000]. 16:53:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:25 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ppoll(&(0x7f0000000280)=[{}, {r1, 0x108}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x2}, {r2, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@uqnoenforce='uqnoenforce'}], [{@uid_lt={'uid<'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:25 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ppoll(&(0x7f0000000280)=[{}, {r1, 0x108}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x2}, {r2, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) [ 399.499906][T13720] XFS (loop0): unknown mount option [uid<00000000000000000000]. 16:53:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@uqnoenforce='uqnoenforce'}], [{@uid_lt={'uid<'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 399.812516][T13733] XFS (loop0): unknown mount option [uid<00000000000000000000]. 16:53:27 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, 0x0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:53:27 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {r1, 0x108}, {r3, 0x20}, {0xffffffffffffffff, 0x2}, {r2, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@uqnoenforce='uqnoenforce'}], [{@uid_lt={'uid<'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:27 executing program 5: r0 = gettid() clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, r1+10000000}, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1004000000016) 16:53:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x80045530, 0x0) 16:53:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae05, &(0x7f00000000c0)={0x1, [0x0]}) [ 402.311632][T13748] XFS (loop0): unknown mount option [uid<00000000000000000000]. 16:53:27 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {r1, 0x108}, {r3, 0x20}, {0xffffffffffffffff, 0x2}, {r2, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:28 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@uqnoenforce='uqnoenforce'}], [{@uid_lt={'uid<'}}]}) 16:53:28 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {r1, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {0xffffffffffffffff, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae05, &(0x7f00000000c0)={0x1, [0x0]}) [ 402.624435][T13777] XFS (loop0): unknown mount option [uid<00000000000000000000]. 16:53:30 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, 0x0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:53:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae05, &(0x7f00000000c0)={0x1, [0x0]}) 16:53:30 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@uqnoenforce='uqnoenforce'}], [{@uid_lt={'uid<'}}]}) 16:53:30 executing program 5: r0 = gettid() clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, r1+10000000}, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1004000000016) 16:53:30 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {r1, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {0xffffffffffffffff, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae05, &(0x7f00000000c0)={0x1, [0x0]}) [ 405.356998][T13798] XFS (loop0): unknown mount option [uid<00000000000000000000]. 16:53:31 executing program 1: ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae05, &(0x7f00000000c0)={0x1, [0x0]}) 16:53:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:31 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@uqnoenforce='uqnoenforce'}], [{@uid_lt={'uid<'}}]}) 16:53:31 executing program 1: ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae05, &(0x7f00000000c0)={0x1, [0x0]}) [ 405.583676][T13817] XFS (loop0): unknown mount option [uid<00000000000000000000]. 16:53:31 executing program 0: syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@uqnoenforce='uqnoenforce'}], [{@uid_lt={'uid<'}}]}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 405.765151][T13827] XFS (loop0): unknown mount option [uid<00000000000000000000]. 16:53:33 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, 0x0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:53:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:33 executing program 1: ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae05, &(0x7f00000000c0)={0x1, [0x0]}) 16:53:33 executing program 0: syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@uqnoenforce='uqnoenforce'}], [{@uid_lt={'uid<'}}]}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:33 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xbd1b) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) 16:53:33 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {r1, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {0xffffffffffffffff, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae05, &(0x7f00000000c0)={0x1, [0x0]}) [ 408.444819][T13844] XFS (loop0): unknown mount option [uid<00000000000000000000]. 16:53:34 executing program 0: syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@uqnoenforce='uqnoenforce'}], [{@uid_lt={'uid<'}}]}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae05, &(0x7f00000000c0)={0x1, [0x0]}) 16:53:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae05, &(0x7f00000000c0)={0x1, [0x0]}) [ 408.780843][T13863] XFS (loop0): unknown mount option [uid<00000000000000000000]. 16:53:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@uqnoenforce='uqnoenforce'}], [{@uid_lt={'uid<'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:37 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:53:37 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae05, &(0x7f00000000c0)={0x1, [0x0]}) 16:53:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@uqnoenforce='uqnoenforce'}], [{@uid_lt={'uid<'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:37 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:37 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xbd1b) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) 16:53:37 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {0xffffffffffffffff, 0x2}, {r0, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:37 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae05, &(0x7f00000000c0)={0x1, [0x0]}) 16:53:37 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:53:37 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {0xffffffffffffffff, 0x2}, {r0, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:37 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae05, &(0x7f00000000c0)={0x1, [0x0]}) 16:53:37 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xbd1b) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) 16:53:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@uqnoenforce='uqnoenforce'}], [{@uid_lt={'uid<'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:37 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {0xffffffffffffffff, 0x2}, {r0, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:37 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) 16:53:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae05, 0x0) 16:53:37 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {0xffffffffffffffff, 0x2}, {r0, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@uqnoenforce='uqnoenforce'}], [{@uid_lt={'uid<'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:37 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x0) dup2(r1, r2) tkill(r0, 0x16) 16:53:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae05, 0x0) 16:53:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:37 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {0xffffffffffffffff, 0x2}, {r0, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:37 executing program 5: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) mkdir(0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xbd1b) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) 16:53:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@uqnoenforce='uqnoenforce'}], [{@uid_lt={'uid<'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae05, 0x0) 16:53:38 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x0) dup2(r1, r2) tkill(r0, 0x16) 16:53:38 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {0xffffffffffffffff, 0x2}, {r0, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae05, &(0x7f00000000c0)) 16:53:38 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x0) dup2(r1, r2) tkill(r0, 0x16) 16:53:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@uqnoenforce='uqnoenforce'}], [{@uid_lt={'uid<'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae05, &(0x7f00000000c0)) 16:53:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:38 executing program 5: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) mkdir(0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xbd1b) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) 16:53:38 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {0xffffffffffffffff, 0x2}, {r0, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:38 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(0xffffffffffffffff, r2) tkill(r0, 0x16) 16:53:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae05, &(0x7f00000000c0)) 16:53:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:39 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {0xffffffffffffffff, 0x2}, {r0, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:39 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) mkdir(0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xbd1b) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) 16:53:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000880)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) [ 413.500230][T14038] XFS (loop0): Invalid superblock magic number 16:53:39 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {0xffffffffffffffff, 0x2}, {r0, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:39 executing program 5: 16:53:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:39 executing program 5: 16:53:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 414.094916][T14087] XFS (loop0): Invalid superblock magic number 16:53:41 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(0xffffffffffffffff, r2) tkill(r0, 0x16) 16:53:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(0x0, &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:41 executing program 1: 16:53:41 executing program 5: 16:53:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:42 executing program 5: 16:53:42 executing program 1: 16:53:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:42 executing program 5: bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) mkdir(0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x8, 0x70bd27, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x24000004}, 0x4000000) 16:53:42 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') pread64(r0, 0x0, 0x0, 0x2) [ 416.480237][T14108] XFS (loop0): Invalid superblock magic number 16:53:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(0x0, &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:44 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(0xffffffffffffffff, r2) tkill(r0, 0x16) 16:53:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:44 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') pread64(r0, 0x0, 0x0, 0x2) 16:53:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(0x0, &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:44 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004900)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r2, 0x0, 0x100000000000e, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) 16:53:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}], [{@uid_lt={'uid<'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) [ 419.421322][T14162] XFS (loop0): unknown mount option [uid<00000000000000000000]. 16:53:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[], [{@uid_lt={'uid<'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:45 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') pread64(r0, 0x0, 0x0, 0x2) [ 419.676577][T14184] XFS (loop0): unknown mount option [uid<00000000000000000000]. 16:53:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[], [{@uid_lt={'uid<'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:48 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, 0xffffffffffffffff) tkill(r0, 0x16) 16:53:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:48 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') pread64(r0, 0x0, 0x0, 0x2) 16:53:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='statm\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 16:53:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) [ 422.522498][T14214] XFS (loop0): unknown mount option [uid<00000000000000000000]. 16:53:48 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x2) 16:53:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[], [{@uid_lt={'uid<'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:48 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r0, 0x409, 0x0) 16:53:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) [ 422.840878][T14248] XFS (loop0): unknown mount option [uid<00000000000000000000]. 16:53:51 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, 0xffffffffffffffff) tkill(r0, 0x16) 16:53:51 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x2) 16:53:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:51 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x321200, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x212, r0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f00000000c0)) close(r1) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x8) 16:53:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 425.544795][T14269] XFS (loop0): Invalid device [./file0], error=-15 16:53:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:51 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:51 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x2) 16:53:51 executing program 5: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c6d, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xd}, 0x8024, 0xffffffffffff2f6a, 0x7, 0x6, 0x0, 0x2, 0x8}, 0x0, 0xf, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x2c) [ 425.773874][T14293] XFS (loop0): Invalid device [./file0], error=-15 16:53:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:54 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, 0xffffffffffffffff) tkill(r0, 0x16) 16:53:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') pread64(r0, 0x0, 0x0, 0x2) 16:53:54 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:54 executing program 5: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c6d, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xd}, 0x8024, 0xffffffffffff2f6a, 0x7, 0x6, 0x0, 0x2, 0x8}, 0x0, 0xf, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x2c) 16:53:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, &(0x7f0000000c80)) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) pread64(r0, 0x0, 0x0, 0x2) 16:53:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) [ 428.614395][T14321] XFS (loop0): Invalid device [./file0], error=-15 16:53:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 16:53:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:54 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) pread64(r0, 0x0, 0x0, 0x2) [ 428.915242][T14346] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 428.933698][T14346] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 428.944443][T14351] XFS (loop0): Invalid device [./file0], error=-15 [ 428.996156][T14346] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 16:53:57 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(0x0, 0x16) 16:53:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:57 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) pread64(r0, 0x0, 0x0, 0x2) 16:53:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:57 executing program 5: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c6d, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x8, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x2c) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:53:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:57 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') pread64(0xffffffffffffffff, 0x0, 0x0, 0x2) [ 431.725506][T14370] XFS (loop0): Invalid device [./file0], error=-15 16:53:57 executing program 5: mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x212, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000040)={0x3, 0x0, 0x1, 0x1ffe00000000000, 0x100, 0x200}) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x20000081) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f00000005c0)={0xa0, 0x0, 0x5, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x0, 0x807c, 0x6, 0x0, 0x2, 0x0, 0x0, 0xcb1}}}}, 0xa0) close(r0) 16:53:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) [ 432.019420][T14396] XFS (loop0): Invalid device [./file0], error=-15 16:53:58 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(0x0, 0x16) 16:53:58 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') pread64(0xffffffffffffffff, 0x0, 0x0, 0x2) 16:53:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") 16:53:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:58 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f00000005c0)={0xa0, 0x0, 0x5, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x807c, 0x6, 0x0, 0x2, 0x0, 0x0, 0xcb1}}}}, 0xa0) close(r0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x8) [ 432.632028][T14413] XFS (loop0): Invalid device [./file0], error=-15 16:53:58 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') pread64(0xffffffffffffffff, 0x0, 0x0, 0x2) 16:53:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x1000008912, 0x0) 16:53:58 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') pread64(r0, 0x0, 0x0, 0x0) 16:53:58 executing program 5: 16:53:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:58 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') pread64(r0, 0x0, 0x0, 0x0) [ 432.973168][T14440] XFS (loop0): Invalid device [./file0], error=-15 16:53:59 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(0x0, 0x16) 16:53:59 executing program 5: 16:53:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:59 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') pread64(r0, 0x0, 0x0, 0x0) 16:53:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x1000008912, 0x0) 16:53:59 executing program 5: 16:53:59 executing program 1: [ 433.548508][T14464] XFS (loop0): Invalid device [./file0], error=-15 16:53:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, 0x0, &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:59 executing program 5: 16:53:59 executing program 1: 16:53:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:53:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x1000008912, 0x0) [ 433.921981][T14488] XFS (loop0): Invalid device [./file0], error=-15 16:53:59 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x0) 16:53:59 executing program 5: 16:53:59 executing program 1: 16:53:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, 0x0, &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:53:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)) 16:54:00 executing program 1: 16:54:00 executing program 5: [ 434.447411][T14501] XFS (loop0): Invalid device [./file0], error=-15 16:54:00 executing program 1: 16:54:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, 0x0, &(0x7f0000000400)='9p\x00', 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:00 executing program 5: 16:54:00 executing program 1: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x10143042, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0xfffffffffffffe37) write$P9_RFSYNC(r0, 0x0, 0x0) 16:54:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:54:00 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x0) 16:54:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)) 16:54:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:54:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:00 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) umount2(0x0, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) 16:54:01 executing program 5: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x10143042, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0xfffffffffffffe37) write$P9_RLINK(r0, 0x0, 0x0) 16:54:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') pipe2$9p(0x0, 0x0) close(r0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) read(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) getsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000000c0)=ANY=[@ANYBLOB="f100000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000002004e220000000000000000"], 0x1) [ 435.364697][T14543] XFS (loop0): Invalid device [./file0], error=-15 16:54:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)) 16:54:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000840)='/\x00~WMzU\xed\xbb\xc8\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbdQ\xb8\xf8\xc8}\x91\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xb1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\x19sT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6d\x17\xbc3\xd7e\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xe4\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\xf7\xff\xff\xff\xff\xff\xff\xff\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xecv:\x1ba=\xd7G\xd5)\xeap\xef\x02\x98\xff\xf5f\x160\xb9\x9ay\xec\x82i\xaf\x9b\xe1x\xae\xca\x17\xfe\xfb\x14\xfd=\x00\x97Z\x99\x9dy\xba\x89M\xba\xe4\xc1\xa6\x06\x00\x00\x00\x00\x00\xc7\x00x\"m\a\xe6:?E\x96~\x0e\xe8Y\xbbn\x0f0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x0) 16:54:01 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0xffffffffffffff56) write$nbd(r0, 0x0, 0x0) 16:54:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") 16:54:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:01 executing program 5: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = shmget(0x3, 0x2000, 0x304, &(0x7f0000ffb000/0x2000)=nil) fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x8, &(0x7f0000000000)=[0xee01, 0xee01, 0xee00, 0xee00, 0x0, 0xee01, 0xee01, 0xee00]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = gettid() shmctl$IPC_SET(r0, 0x1, &(0x7f0000000240)={{0x8d3, r1, r2, r3, r4, 0x100, 0xffffffffffffff01}, 0x2, 0xb, 0x7, 0x0, r5, 0x0, 0x9}) 16:54:01 executing program 5: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x10143042, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0xfffffffffffffe37) write$P9_RLERRORu(r0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) 16:54:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fremovexattr(0xffffffffffffffff, 0x0) r2 = dup3(r0, r1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, 0x0, 0x0) [ 436.263272][T14593] XFS (loop0): Invalid device [./file0], error=-15 16:54:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") 16:54:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f0000000100)) write$binfmt_aout(r2, &(0x7f0000000000)={{0x1cf, 0x1, 0x4, 0xb6, 0x121, 0x5, 0x294, 0xc8e5}, "7f8c227d00a661440ce12f9d86feee786a1ed1a4ff31264f201455c13005c06fbcc31381fd2f48772479c6ccb3ccf9070b33ef08f51377a56d9ce537f5e3ff94c237a4b0135d8a6c"}, 0x68) 16:54:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0xc000, 0x0) [ 436.501466][T14615] XFS (loop0): Invalid device [./file0], error=-15 16:54:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:54:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") 16:54:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}, {@measure='measure'}, {@pcr={'pcr', 0x3d, 0x3f}}]}}) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:02 executing program 5: r0 = socket(0x80000000a, 0x3, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) 16:54:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000200)) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000000)) 16:54:02 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) [ 437.137499][T14639] XFS (loop0): Invalid device [./file0], error=-15 16:54:02 executing program 5: r0 = socket(0x80000000a, 0x3, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) 16:54:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:02 executing program 4: r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x3) unshare(0x20020000) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x800, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:udev_helper_exec_t:s0\x00', 0x28, 0x2) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000002c0)={0x7, 0x2, 0x8b0a, 0x5, 0x41615d49, 0xc2f1, 0x7, 0x5}, &(0x7f0000000340)={0x2, 0x2, 0x2, 0x9, 0x4, 0x5}, &(0x7f0000000380)={0x4, 0x3ff, 0x0, 0x81, 0x200, 0xffffffffffffff9b, 0xffffffffffff8000, 0x7}, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000440)={&(0x7f0000000400)={0xff}, 0x8}) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f00000004c0)=@add_del={0x2, &(0x7f0000000480)='nr0\x00'}) poll(0x0, 0x0, 0x84d8) socket$tipc(0x1e, 0x5, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0xf45) init_module(&(0x7f0000000000)='ramfs\x00', 0x6, &(0x7f00000000c0)='ramfs\x00') rmdir(&(0x7f0000000040)='./file0\x00') 16:54:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") 16:54:02 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) 16:54:03 executing program 5: r0 = socket(0x80000000a, 0x3, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) 16:54:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:54:03 executing program 1: 16:54:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) [ 437.457319][T14666] XFS (loop0): Invalid device [./file0], error=-15 16:54:03 executing program 5: r0 = socket(0x80000000a, 0x3, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) 16:54:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") 16:54:03 executing program 1: 16:54:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:54:03 executing program 5: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) [ 437.803826][T14692] XFS (loop0): Invalid device [./file0], error=-15 16:54:03 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}, {}], 0x7, 0x0, 0x0, 0x0) 16:54:03 executing program 1: r0 = gettid() futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000002, 0x0, &(0x7f0000003b40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x80000000005, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r2, 0xa, 0x12) readv(r3, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/6, 0x6}], 0x1) dup2(r2, r3) fcntl$setownex(r2, 0xf, &(0x7f0000000140)={0x0, r0}) tkill(r0, 0x16) 16:54:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") 16:54:03 executing program 5: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) 16:54:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:03 executing program 5: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) [ 438.285316][T14718] XFS (loop0): Invalid device [./file0], error=-15 16:54:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") 16:54:04 executing program 5: r0 = socket(0x0, 0x3, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) [ 438.543474][T14740] XFS (loop0): Invalid device [./file0], error=-15 16:54:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") [ 438.743279][T14753] XFS (loop0): Invalid device [./file0], error=-15 16:54:04 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', 0x0, &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:04 executing program 5: r0 = socket(0x0, 0x3, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) 16:54:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x25}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 16:54:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") 16:54:04 executing program 5: r0 = socket(0x0, 0x3, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) 16:54:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', 0x0, &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:04 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) [ 439.364985][T14778] XFS (loop0): Invalid device [./file0], error=-15 16:54:05 executing program 5: r0 = socket(0x80000000a, 0x0, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) 16:54:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', 0x0, &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:05 executing program 1: openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:05 executing program 0: 16:54:05 executing program 0: 16:54:05 executing program 5: r0 = socket(0x80000000a, 0x0, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) 16:54:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:05 executing program 0: 16:54:05 executing program 0: 16:54:05 executing program 5: r0 = socket(0x80000000a, 0x0, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) 16:54:05 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:05 executing program 0: 16:54:06 executing program 1: openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:06 executing program 5: r0 = socket(0x80000000a, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) 16:54:06 executing program 0: 16:54:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:06 executing program 0: 16:54:06 executing program 5: r0 = socket(0x80000000a, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) 16:54:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:06 executing program 0: 16:54:06 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:54:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}, {}], 0x6, 0x0, 0x0, 0x0) 16:54:06 executing program 0: 16:54:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:06 executing program 1: openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:06 executing program 5: r0 = socket(0x80000000a, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) 16:54:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:06 executing program 0: 16:54:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1, 0xa021}], 0x5, 0x0, 0x0, 0x0) 16:54:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {0xffffffffffffffff, 0x2}], 0x4, 0x0, 0x0, 0x0) 16:54:06 executing program 0: 16:54:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:07 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:54:07 executing program 5: socket(0x80000000a, 0x3, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) 16:54:07 executing program 0: 16:54:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCGETA(r0, 0x5405, &(0x7f00000001c0)) 16:54:07 executing program 1: openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:07 executing program 5: socket(0x80000000a, 0x3, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) 16:54:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:07 executing program 5: socket(0x80000000a, 0x3, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a3, &(0x7f0000000380)={'bridge0\x00', 0x200000000b}) 16:54:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {0xffffffffffffffff, 0x2}], 0x4, 0x0, 0x0, 0x0) 16:54:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000380)=0x4001ff) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) 16:54:08 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:54:08 executing program 5: r0 = socket(0x80000000a, 0x3, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, 0x0) 16:54:08 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 16:54:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:08 executing program 5: r0 = socket(0x80000000a, 0x3, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, 0x0) [ 442.615152][T14964] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 16:54:08 executing program 1: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) creat(0x0, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 16:54:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) [ 442.656439][T14964] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 442.685862][T14964] Error parsing options; rc = [-22] 16:54:08 executing program 5: r0 = socket(0x80000000a, 0x3, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, 0x0) 16:54:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) 16:54:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {0xffffffffffffffff, 0x2}], 0x4, 0x0, 0x0, 0x0) 16:54:08 executing program 5: r0 = socket(0x80000000a, 0x3, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, &(0x7f0000000380)={'bridge0\x00'}) 16:54:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:09 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0x22, &(0x7f0000000000), 0x4) 16:54:09 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, &(0x7f0000000100)={0xff}, 0x8) 16:54:09 executing program 5: r0 = socket(0x80000000a, 0x3, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, &(0x7f0000000380)={'bridge0\x00'}) 16:54:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:09 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xffffffe5) fallocate(r0, 0x3, 0x0, 0x8001) 16:54:09 executing program 5: r0 = socket(0x80000000a, 0x3, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, &(0x7f0000000380)={'bridge0\x00'}) 16:54:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:09 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x3, 0x81) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 16:54:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {0xffffffffffffffff, 0x2}, {0xffffffffffffffff, 0xa021}], 0x5, 0x0, 0x0, 0x0) 16:54:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x0, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:09 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x0, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x0, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:10 executing program 1: mknod(&(0x7f0000000300)='./bus\x00', 0x1001040, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x2803, 0x0) 16:54:10 executing program 5: r0 = inotify_init1(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000200)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) 16:54:10 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:10 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x200) read(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 16:54:10 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:10 executing program 1: mknod(&(0x7f0000000300)='./bus\x00', 0x1001040, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x2803, 0x0) 16:54:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) [ 444.729734][T15077] input: syz1 as /devices/virtual/input/input5 16:54:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {0xffffffffffffffff, 0x2}, {0xffffffffffffffff, 0xa021}], 0x5, 0x0, 0x0, 0x0) 16:54:10 executing program 1: mknod(&(0x7f0000000300)='./bus\x00', 0x1001040, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x2803, 0x0) 16:54:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f00000006c0)='./bus\x00') ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000002c0)="5c01000000000000060000") r1 = creat(&(0x7f0000000600)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x80000001) syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000b80)=ANY=[@ANYRESOCT], 0x1}, 0x1, 0x0, 0x0, 0x240048c4}, 0x800) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) socket$inet6(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x810, r0, 0xfffffffffffffff8) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000240)=0xffffffff) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x6, 0x80000000}, &(0x7f0000000340)=0x20) socket$inet6(0xa, 0x5, 0x2) setsockopt$inet6_int(r1, 0x29, 0x20000000000000d1, &(0x7f0000000380)=0x1000000000000000, 0x4) r3 = socket(0x10, 0x1000000000000003, 0x0) io_setup(0x3ff, &(0x7f0000000580)=0x0) mkdir(&(0x7f0000000500)='./bus\x00', 0x23) io_submit(r4, 0x1, &(0x7f0000002c40)=[&(0x7f0000002c00)={0x0, 0x0, 0x0, 0x2, 0x0, r3, &(0x7f0000002b40)="9d0a72bcc4856fcc438594dd8e63d800ebfd09745fec73495023c49e4bff2a065ee46ece59c81429ff5e229a3f621f9a7b4eddaf637371d5ddaaf9a953af82e979ebf507f7ff4dc63e780b8c8f3d6e3e515fea491c733bb1b1745d6224214915afa2a71415576959973cdbb266625f318b678ec75f1dc21bcae7df3b7aca64472e84e85cd1f26e9cc47002636aece26636558117836a6896a153209df6c7d37437", 0xa1, 0x80000001, 0x0, 0x3, r2}]) r5 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|\x80g\x94\x81\x99W*\f+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY\xc0\xcb-\xa4\x93\xabr\xfeq\xa6\xdbc\xfc\x94\xc0\x81rV\xce\xb3\x84\x90\\\x85\xa7\xe5\n') sendfile(r5, r5, &(0x7f00000000c0)=0x202, 0xdd) 16:54:10 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:10 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 445.042024][T15099] input: syz1 as /devices/virtual/input/input7 16:54:10 executing program 1: mknod(&(0x7f0000000300)='./bus\x00', 0x1001040, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x2803, 0x0) 16:54:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:10 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:10 executing program 0: r0 = memfd_create(&(0x7f0000000280)='/dev/autofs\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0'}, 0x4) [ 445.309382][T15124] input: syz1 as /devices/virtual/input/input8 16:54:11 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {0xffffffffffffffff, 0x2}, {0xffffffffffffffff, 0xa021}], 0x5, 0x0, 0x0, 0x0) 16:54:11 executing program 1: open(&(0x7f0000000240)='./bus\x00', 0x2803, 0x0) 16:54:11 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:11 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:11 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:11 executing program 1: open(&(0x7f0000000240)='./bus\x00', 0x2803, 0x0) [ 445.944576][T15149] input: syz1 as /devices/virtual/input/input9 16:54:11 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:11 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:11 executing program 1: open(&(0x7f0000000240)='./bus\x00', 0x2803, 0x0) 16:54:11 executing program 1: mknod(0x0, 0x1001040, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x2803, 0x0) 16:54:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {0xffffffffffffffff, 0x2}, {r1}], 0x5, 0x0, 0x0, 0x0) 16:54:12 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:12 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:12 executing program 1: mknod(0x0, 0x1001040, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x2803, 0x0) 16:54:12 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:12 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2, 0x20}, {r1}], 0x4, 0x0, 0x0, 0x0) 16:54:12 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) 16:54:12 executing program 1: mknod(0x0, 0x1001040, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x2803, 0x0) 16:54:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:12 executing program 1: mknod(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x2803, 0x0) 16:54:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {}], 0x4, 0x0, 0x0, 0x0) 16:54:12 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:12 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:12 executing program 1: mknod(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x2803, 0x0) 16:54:13 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) epoll_create(0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:13 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:13 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) 16:54:13 executing program 1: mknod(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x2803, 0x0) 16:54:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:13 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) 16:54:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {}], 0x4, 0x0, 0x0, 0x0) 16:54:13 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) epoll_create(0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:13 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) 16:54:13 executing program 1: mknod(&(0x7f0000000300)='./bus\x00', 0x1001040, 0x0) open(0x0, 0x2803, 0x0) 16:54:13 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) 16:54:13 executing program 1: mknod(&(0x7f0000000300)='./bus\x00', 0x1001040, 0x0) open(0x0, 0x2803, 0x0) 16:54:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:14 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) 16:54:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:14 executing program 1: mknod(&(0x7f0000000300)='./bus\x00', 0x1001040, 0x0) open(0x0, 0x2803, 0x0) 16:54:14 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1, 0x20}, {}], 0x4, 0x0, 0x0, 0x0) 16:54:14 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) epoll_create(0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:14 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:14 executing program 1: mknod(&(0x7f0000000300)='./bus\x00', 0x1001040, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) 16:54:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:14 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:14 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:15 executing program 0: futex(0x0, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:15 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:15 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1}], 0x3, 0x0, 0x0, 0x0) 16:54:15 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:15 executing program 0: futex(0x0, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:15 executing program 1: mknod(&(0x7f0000000300)='./bus\x00', 0x1001040, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) 16:54:15 executing program 0: futex(0x0, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:15 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:15 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, 0x0, 0x5, 0x90, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1}], 0x3, 0x0, 0x0, 0x0) 16:54:15 executing program 0: futex(&(0x7f0000000040), 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:15 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, 0x0, 0x5, 0x90, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r1}], 0x3, 0x0, 0x0, 0x0) 16:54:15 executing program 0: futex(&(0x7f0000000040), 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:15 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:16 executing program 1: mknod(&(0x7f0000000300)='./bus\x00', 0x1001040, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) 16:54:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, 0x0, 0x5, 0x90, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:16 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {0xffffffffffffffff, 0x20}, {r1}], 0x4, 0x0, 0x0, 0x0) 16:54:16 executing program 0: futex(&(0x7f0000000040), 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:16 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:16 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {0xffffffffffffffff, 0x20}, {r1}], 0x4, 0x0, 0x0, 0x0) 16:54:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:16 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {0xffffffffffffffff, 0x20}, {r1}], 0x4, 0x0, 0x0, 0x0) 16:54:16 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {0xffffffffffffffff, 0x108}, {r2}, {r1}], 0x4, 0x0, 0x0, 0x0) 16:54:17 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:17 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:17 executing program 4: write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r0 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:17 executing program 1: r0 = socket(0x11, 0x2, 0x5a78fbc) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) 16:54:17 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:17 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:17 executing program 4: write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r0 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {r2}, {r1}], 0x3, 0x0, 0x0, 0x0) 16:54:17 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 16:54:17 executing program 1: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f00000016c0)) 16:54:17 executing program 4: write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r0 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {}, {r1}], 0x3, 0x0, 0x0, 0x0) 16:54:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:17 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:17 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) 16:54:17 executing program 4: pipe(0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r0 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:17 executing program 1: creat(&(0x7f0000000700)='./bus\x00', 0x0) mount$9p_tcp(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) [ 452.093599][T15467] input: syz1 as /devices/virtual/input/input28 16:54:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {}, {r1}], 0x3, 0x0, 0x0, 0x0) 16:54:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:17 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:17 executing program 4: pipe(0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r0 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:17 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) [ 452.252446][T15479] 9pnet_virtio: no channels available for device 127.0.0.1 16:54:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {}, {r1}], 0x3, 0x0, 0x0, 0x0) [ 452.313810][T15479] 9pnet_virtio: no channels available for device 127.0.0.1 [ 452.338410][T15489] input: syz1 as /devices/virtual/input/input29 16:54:18 executing program 1: sysinfo(&(0x7f00000007c0)=""/154) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000040)={0x18b5}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000020000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 16:54:18 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:18 executing program 4: pipe(0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r0 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 16:54:18 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) 16:54:18 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:18 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(0x0, 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 452.704897][T15523] input: syz1 as /devices/virtual/input/input30 16:54:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {r1}], 0x2, 0x0, 0x0, 0x0) 16:54:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {r1}], 0x2, 0x0, 0x0, 0x0) 16:54:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) stat(0x0, &(0x7f0000000e80)) getgroups(0x0, 0x0) stat(&(0x7f0000000640)='./file0\x00', 0x0) getgroups(0x0, 0x0) stat(&(0x7f00000007c0)='./file0\x00', 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) lstat(&(0x7f0000000c40)='./file0\x00', 0x0) getgid() mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x20000, &(0x7f0000000480)={'trans=unix,', {[{@mmap='mmap'}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@cachetag={'cachetag', 0x3d, 'security'}}, {@aname={'aname', 0x3d, 'bdev}'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'syzkaller\x00'}}, {@dont_appraise='dont_appraise'}, {@audit='audit'}]}}) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) 16:54:18 executing program 1: sysinfo(&(0x7f00000007c0)=""/154) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000040)={0x18b5}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000020000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 16:54:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{}, {r1}], 0x2, 0x0, 0x0, 0x0) 16:54:18 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f00000000c0)={0x0, 0x0, 0x0}) 16:54:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 16:54:19 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f00000000c0)={0x0, 0x0, 0x0}) 16:54:19 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) 16:54:19 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:19 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(0x0, 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 16:54:19 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f00000000c0)={0x0, 0x0, 0x0}) 16:54:19 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) ppoll(&(0x7f0000000880)=[{r0}], 0x1, &(0x7f0000000900), 0x0, 0x0) 16:54:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r0, r1, 0x0) 16:54:19 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f00000000c0)={0x0, 0x0, 0x0}) 16:54:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x14, 0x1, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 16:54:19 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000040)=0x8) 16:54:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:19 executing program 5: ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, &(0x7f00000000c0)={0x0, 0x0, 0x0}) 16:54:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:20 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:20 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(0x0, 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:20 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$rfkill(r0, 0x0, 0x0) 16:54:20 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x0) 16:54:20 executing program 5: ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, &(0x7f00000000c0)={0x0, 0x0, 0x0}) 16:54:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x2, 0xe, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0ad", 0x0}, 0x28) 16:54:20 executing program 2: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:54:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0x0, 0x0, 0x0, 0x0}, 0x28) 16:54:20 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0xc0045878, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 16:54:20 executing program 5: ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, &(0x7f00000000c0)={0x0, 0x0, 0x0}) 16:54:20 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:20 executing program 5: r0 = syz_open_dev$video(0x0, 0x4000fff, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f00000000c0)={0x0, 0x0, 0x0}) [ 454.803488][T15663] hfs: can't find a HFS filesystem on dev loop2 [ 454.898014][T15663] hfs: can't find a HFS filesystem on dev loop2 16:54:20 executing program 5: r0 = syz_open_dev$video(0x0, 0x4000fff, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f00000000c0)={0x0, 0x0, 0x0}) 16:54:21 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0x0, 0x0, 0x0, 0x0}, 0x28) 16:54:21 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:21 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:21 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) syz_open_dev$media(0x0, 0x5c, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000600)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 16:54:21 executing program 5: r0 = syz_open_dev$video(0x0, 0x4000fff, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f00000000c0)={0x0, 0x0, 0x0}) 16:54:21 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f00000000c0)={0x0, 0x0, 0x0}) 16:54:21 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) sendto$x25(r0, 0x0, 0x0, 0x2d4c2b6a6ed82a88, 0x0, 0x0) 16:54:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0x0, 0x0, 0x0, 0x0}, 0x28) 16:54:21 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f00000000c0)={0x0, 0x0, 0x0}) 16:54:21 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:21 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) sendto$x25(r0, 0x0, 0x0, 0x2d4c2b6a6ed82a88, 0x0, 0x0) 16:54:21 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0x0, 0x0, &(0x7f0000000100), 0x0}, 0x28) 16:54:21 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f00000000c0)={0x0, 0x0, 0x0}) 16:54:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5c, 0x400402) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000580)) syz_init_net_socket$ax25(0x3, 0x3, 0xcf) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000600)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 16:54:21 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:21 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:22 executing program 5: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, &(0x7f00000000c0)={0x0, 0x0, 0x0}) 16:54:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5c, 0x400402) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000580)) syz_init_net_socket$ax25(0x3, 0x3, 0xcf) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000600)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 16:54:22 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0x0, 0x0, &(0x7f0000000100), 0x0}, 0x28) 16:54:22 executing program 5: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, &(0x7f00000000c0)={0x0, 0x0, 0x0}) 16:54:22 executing program 5: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, &(0x7f00000000c0)={0x0, 0x0, 0x0}) 16:54:22 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0) 16:54:22 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0x0, 0x0, &(0x7f0000000100), 0x0}, 0x28) 16:54:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5c, 0x400402) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000580)) syz_init_net_socket$ax25(0x3, 0x3, 0xcf) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000600)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 16:54:22 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, 0x0) 16:54:22 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:23 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:23 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, 0x0) 16:54:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5c, 0x400402) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000580)) syz_init_net_socket$ax25(0x3, 0x3, 0xcf) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000600)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 16:54:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0x7, 0x0, &(0x7f0000000100)="69cd1330bf139a", 0x0}, 0x28) 16:54:23 executing program 1: io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 16:54:23 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, 0x0) 16:54:23 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 16:54:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x127e, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0}) 16:54:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0x7, 0x0, &(0x7f0000000100)="69cd1330bf139a", 0x0}, 0x28) 16:54:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000000140)={'syz'}) 16:54:23 executing program 1: io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 16:54:23 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/fib_triestat\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 16:54:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet6_tcp_int(r0, 0x6, 0x11, &(0x7f0000000140)=0x7, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x1) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0xffffffe3, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) getresgid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/148, 0x94}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f00000000c0)={0x1f, 0x8, 0x0, 0x2, 0x14}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x2b, 'io'}, {0x0, 'memory'}]}, 0xc) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000240)) syz_genetlink_get_family_id$tipc2(0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(0xffffffffffffffff, &(0x7f0000000380), 0xfffffffe) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r3, &(0x7f0000000480), 0x1000000000000237, 0x0) signalfd4(r3, &(0x7f00000000c0)={0x1ff}, 0x8, 0x80800) 16:54:23 executing program 1: io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 16:54:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0x7, 0x0, &(0x7f0000000100)="69cd1330bf139a", 0x0}, 0x28) 16:54:23 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000240)={0x30}, 0x30) 16:54:24 executing program 1: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:24 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 16:54:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xb, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd1", 0x0}, 0x28) 16:54:24 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:24 executing program 1: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:24 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet6_tcp_int(r0, 0x6, 0x11, &(0x7f0000000140)=0x7, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x1) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0xffffffe3, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) getresgid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/148, 0x94}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f00000000c0)={0x1f, 0x8, 0x0, 0x2, 0x14}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x2b, 'io'}, {0x0, 'memory'}]}, 0xc) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000240)) syz_genetlink_get_family_id$tipc2(0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(0xffffffffffffffff, &(0x7f0000000380), 0xfffffffe) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r3, &(0x7f0000000480), 0x1000000000000237, 0x0) signalfd4(r3, &(0x7f00000000c0)={0x1ff}, 0x8, 0x80800) 16:54:24 executing program 1: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:24 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xb, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd1", 0x0}, 0x28) 16:54:25 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:25 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xb, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd1", 0x0}, 0x28) 16:54:25 executing program 0: futex(&(0x7f0000000040)=0x40000000004, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 16:54:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/dev\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 16:54:25 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:25 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:25 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xd, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0", 0x0}, 0x28) 16:54:25 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='reno\x00', 0x5) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0xffffffe3, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x14}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x0, 'io'}, {0x0, 'memory'}]}, 0xc) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000240)) syz_genetlink_get_family_id$tipc2(0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000480)={'lo\x00'}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000237, 0x0) mkdir(0x0, 0x0) 16:54:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xd, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0", 0x0}, 0x28) 16:54:25 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:25 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:26 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:26 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:26 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101502, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x42, &(0x7f0000000140)=@in={0x2, 0x0, @dev}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x0, 0x0) geteuid() getgroups(0x0, 0x0) fstat(r0, 0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) mount$9p_unix(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0xc0044dff, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x6}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2, 0xd, 0x0, &(0x7f0000000100)="69cd1330bf139ae7c29bd13fa0", 0x0}, 0x28) 16:54:26 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 16:54:26 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='reno\x00', 0x5) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0xffffffe3, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x14}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x0, 'io'}, {0x0, 'memory'}]}, 0xc) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000240)) syz_genetlink_get_family_id$tipc2(0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000480)={'lo\x00'}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000237, 0x0) mkdir(0x0, 0x0) 16:54:26 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:26 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:26 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 16:54:26 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) 16:54:26 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0xffffffe3, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x14}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x0, 'io'}, {0x0, 'memory'}]}, 0xc) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000380), 0xfffffffe) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) mkdir(0x0, 0x0) 16:54:26 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)) io_submit(0x0, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/121, 0x79}], 0x1, 0x400000000000) 16:54:26 executing program 0: clone(0x900900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000004b40)='/dev/cachefiles\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe63, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x194, 0x3f9b3b26452437c6, 0x0, 0x0, 0x0, 0x8}, 0x28) creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) 16:54:27 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x5a) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @initdev}, 0x10) getsockopt$inet_pktinfo(r0, 0x0, 0xe, 0x0, &(0x7f0000000100)) 16:54:27 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)) io_submit(0x0, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/121, 0x79}], 0x1, 0x400000000000) 16:54:27 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:27 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:27 executing program 5: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000022) open(&(0x7f0000000300)='./file0\x00', 0x418a01, 0x0) 16:54:27 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/121, 0x79}], 0x1, 0x400000000000) 16:54:27 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x0) 16:54:27 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)) io_submit(0x0, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:54:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x7fff, &(0x7f0000000080)) 16:54:27 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/121, 0x79}], 0x1, 0x400000000000) 16:54:27 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, 0x0) 16:54:27 executing program 5: socketpair$unix(0x1, 0x800000000000005, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x7) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) 16:54:27 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:27 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/121, 0x79}], 0x1, 0x400000000000) 16:54:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 16:54:27 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, 0x0) 16:54:27 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:27 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/121, 0x79}], 0x1, 0x400000000000) 16:54:28 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) signalfd(r1, &(0x7f0000000140)={0x1f}, 0x8) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 16:54:28 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, 0x0) 16:54:28 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:28 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:28 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/121, 0x79}], 0x1, 0x400000000000) 16:54:28 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:28 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, &(0x7f0000000440)) 16:54:28 executing program 5: clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x0, 0x989680}, 0x0) r0 = gettid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1000000000013) tkill(r0, 0x800040000000015) socket$unix(0x1, 0x2, 0x0) r2 = creat(0x0, 0x0) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f00000000c0)={'erspan0\x00', 0x100}) openat$cgroup_ro(r2, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) 16:54:28 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:28 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:28 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/121, 0x79}], 0x1, 0x400000000000) 16:54:28 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:28 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, &(0x7f0000000440)) 16:54:28 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:28 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/121, 0x79}], 0x1, 0x400000000000) 16:54:28 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:28 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:28 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, &(0x7f0000000440)) 16:54:28 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:29 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:29 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/121, 0x79}], 0x1, 0x400000000000) 16:54:29 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:29 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:54:29 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:29 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x1, &(0x7f0000000440)=[0x0]) 16:54:29 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/121, 0x79}], 0x1, 0x400000000000) 16:54:29 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:29 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:29 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x1, &(0x7f0000000440)=[0x0]) 16:54:29 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/121, 0x79}], 0x1, 0x400000000000) 16:54:29 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:29 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:29 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/121, 0x79}], 0x1, 0x400000000000) 16:54:29 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x1, &(0x7f0000000440)=[0x0]) 16:54:30 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:54:30 executing program 0: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:30 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/121, 0x79}], 0x1, 0x400000000000) 16:54:30 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:30 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:30 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 16:54:30 executing program 0: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:30 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:30 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x400000000000) 16:54:30 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 16:54:30 executing program 0: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:30 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x400000000000) 16:54:31 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:54:31 executing program 0: r0 = socket$inet(0x2, 0x0, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:31 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:31 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x400000000000) 16:54:31 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x1, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 16:54:31 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:31 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000240), 0x0, 0x400000000000) 16:54:31 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xffff3fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x4a, &(0x7f0000534000), &(0x7f0000000080)=0xfdda) 16:54:31 executing program 0: r0 = socket$inet(0x2, 0x0, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:31 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000240), 0x0, 0x400000000000) 16:54:31 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:32 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:54:32 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xffff3fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x4a, &(0x7f0000534000), &(0x7f0000000080)=0xfdda) 16:54:32 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000240), 0x0, 0x400000000000) 16:54:32 executing program 0: r0 = socket$inet(0x2, 0x0, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:32 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:32 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:32 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{0x0}], 0x1, 0x400000000000) 16:54:32 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:32 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:32 executing program 1: 16:54:32 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{0x0}], 0x1, 0x400000000000) 16:54:32 executing program 1: 16:54:33 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:54:33 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:33 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{0x0}], 0x1, 0x400000000000) 16:54:33 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:33 executing program 1: 16:54:33 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:33 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/121, 0x79}], 0x1, 0x0) 16:54:33 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:54:33 executing program 1: 16:54:33 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:33 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:33 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/121, 0x79}], 0x1, 0x0) 16:54:33 executing program 1: 16:54:33 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:54:33 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/121, 0x79}], 0x1, 0x0) 16:54:33 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:33 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:33 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:33 executing program 1: 16:54:33 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:54:33 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:33 executing program 3: 16:54:33 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:33 executing program 1: 16:54:33 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:33 executing program 3: 16:54:33 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:34 executing program 1: 16:54:34 executing program 3: 16:54:34 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:34 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:34 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:54:34 executing program 1: 16:54:34 executing program 3: 16:54:34 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:34 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:34 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:34 executing program 3: 16:54:34 executing program 1: 16:54:34 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e130000000000000000000000000000"], 0x29) 16:54:34 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:34 executing program 3: 16:54:34 executing program 1: 16:54:35 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:54:35 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x0) 16:54:35 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, 0x0}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:35 executing program 3: 16:54:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) mincore(&(0x7f0000fff000/0x1000)=nil, 0x1000, &(0x7f0000000040)=""/241) 16:54:35 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2f) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="d739eb24c884d255cb38b8fb6bad6ed97d36e55637bd459b6a533d1533ead4690846ccb15dc6671bf559449b3907253a3701c07a1cb8743205"], 0x39) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r2, 0x0, 0x0) 16:54:35 executing program 3: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa6}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 16:54:35 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, 0x0}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:35 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x0) 16:54:35 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), 0x8) io_setup(0x3, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'ip_vti0\x00\x1e\x00', 0x800201d}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ip_vti0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@dev, 0x4, r3}) 16:54:35 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, 0x0}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:36 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 16:54:36 executing program 1: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x45}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 16:54:36 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x0) 16:54:36 executing program 3: timer_create(0x2, 0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f00000000c0)) timer_settime(0x0, 0x0, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_gettime(0x0, &(0x7f0000000340)) 16:54:36 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:36 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:36 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:36 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[], 0x0) 16:54:36 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x7530}}, &(0x7f0000000080)) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'veth1_to_bridge\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000500)={{{@in=@broadcast}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000600)=0xe8) getsockname$packet(r1, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x1e5) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'teql0\x00', r3}) r4 = accept$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'vcan0\x00', r5}) ioctl$int_out(r0, 0x2, &(0x7f0000000200)) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback, @dev, @rand_addr="6b7c65dd3ac38b74bff04e685343a9b1", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000100)={0x3ff, 0x1, 0x1, 0x8000}, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local, @loopback, @empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r2, 0x1, 0x6, @link_local}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)=0x0) sched_getparam(r7, &(0x7f0000000400)) r8 = getpgid(r7) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0xf, 0x5, &(0x7f0000000440)=@raw=[@generic={0x6, 0x9, 0x400, 0x1, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3f}, @alu={0x7, 0x0, 0x7, 0x7, 0x5, 0xffffffffffffffff, 0xfffffffffffffff0}, @exit, @ldst={0x2, 0x1, 0x1, 0x9, 0xd}], &(0x7f0000000480)='GPL\x00', 0x80000001, 0x1000, &(0x7f0000001140)=""/4096, 0x41100, 0x1, [], r2, 0xa}, 0x48) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000140)=0x8) get_robust_list(r8, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) 16:54:36 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x80802, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="1b0000001200030207fffd946fa28308070019006c000000020085", 0x1b}], 0x1}, 0x0) 16:54:36 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:36 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[], 0x0) [ 471.199361][T16546] netlink: 'syz-executor.3': attribute type 25 has an invalid length. [ 471.236184][T16546] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. [ 471.268408][T16552] netlink: 'syz-executor.3': attribute type 25 has an invalid length. [ 471.283614][T16552] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. 16:54:37 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 16:54:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=@allocspi={0xf8, 0x16, 0x311, 0x0, 0x0, {{{@in, @in=@broadcast}, {@in6=@local, 0x0, 0x6c}, @in6}}}, 0xf8}, 0x8}, 0x0) 16:54:37 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:37 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:37 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[], 0x0) 16:54:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x3}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 16:54:37 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x20000000) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) unshare(0x24020400) 16:54:37 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:37 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 16:54:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$RTC_AIE_ON(r1, 0x7001) 16:54:37 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 16:54:37 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:38 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 16:54:38 executing program 1: 16:54:38 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:38 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 16:54:38 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:38 executing program 3: 16:54:38 executing program 1: 16:54:38 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:38 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000"], 0x15) 16:54:38 executing program 3: 16:54:38 executing program 1: 16:54:38 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:39 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$netlink(0x10, 0x3, 0x4) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) 16:54:39 executing program 3: 16:54:39 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1a8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:39 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000"], 0x15) 16:54:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pselect6(0x40, &(0x7f0000000000)={0x1f}, 0x0, &(0x7f0000000080)={0x7, 0x9, 0x8, 0x8000, 0x4, 0x100000000, 0x5, 0x9df}, &(0x7f0000000100), &(0x7f00000001c0)={&(0x7f0000000140)={0x3}, 0x8}) 16:54:39 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:39 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1a8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x0) 16:54:39 executing program 1: 16:54:39 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000"], 0x15) 16:54:39 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$netlink(0x10, 0x3, 0x4) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) 16:54:39 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1a8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:39 executing program 3: 16:54:39 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$netlink(0x10, 0x3, 0x4) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) 16:54:39 executing program 1: 16:54:39 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e1300000000"], 0x1f) 16:54:39 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:39 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:39 executing program 3: 16:54:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/sockstat\x00') pread64(r0, 0x0, 0xfffffce6, 0x3) 16:54:39 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:54:39 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e1300000000"], 0x1f) 16:54:39 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') 16:54:39 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e1300000000"], 0x1f) 16:54:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='io\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x0) 16:54:40 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:40 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) [ 474.517959][T16712] [ 474.520337][T16712] ====================================================== [ 474.527380][T16712] WARNING: possible circular locking dependency detected [ 474.534413][T16712] 5.1.0-rc2-next-20190327 #12 Not tainted [ 474.540137][T16712] ------------------------------------------------------ [ 474.547169][T16712] syz-executor.1/16712 is trying to acquire lock: [ 474.553676][T16712] 000000002cab4f86 (&sig->cred_guard_mutex){+.+.}, at: do_io_accounting+0x1f4/0x830 [ 474.563074][T16712] 16:54:40 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) [ 474.563074][T16712] but task is already holding lock: [ 474.570457][T16712] 00000000d2e5b259 (&p->lock){+.+.}, at: seq_read+0x71/0x1130 [ 474.577952][T16712] [ 474.577952][T16712] which lock already depends on the new lock. [ 474.577952][T16712] [ 474.588364][T16712] [ 474.588364][T16712] the existing dependency chain (in reverse order) is: [ 474.597387][T16712] [ 474.597387][T16712] -> #2 (&p->lock){+.+.}: [ 474.603915][T16712] lock_acquire+0x16f/0x3f0 [ 474.608959][T16712] __mutex_lock+0xf7/0x1310 [ 474.613994][T16712] mutex_lock_nested+0x16/0x20 [ 474.619286][T16712] seq_read+0x71/0x1130 [ 474.619336][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 474.623970][T16712] proc_reg_read+0x1fe/0x2c0 [ 474.623983][T16712] do_iter_read+0x4a9/0x660 [ 474.623995][T16712] vfs_readv+0xf0/0x160 [ 474.624009][T16712] default_file_splice_read+0x475/0x890 [ 474.624029][T16712] do_splice_to+0x12a/0x190 [ 474.631451][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 474.636334][T16712] do_splice+0x10a9/0x13c0 [ 474.636346][T16712] __x64_sys_splice+0x2c6/0x330 [ 474.636360][T16712] do_syscall_64+0x103/0x610 [ 474.636377][T16712] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.636381][T16712] [ 474.636381][T16712] -> #1 (&pipe->mutex/1){+.+.}: [ 474.636405][T16712] lock_acquire+0x16f/0x3f0 [ 474.636417][T16712] __mutex_lock+0xf7/0x1310 [ 474.636436][T16712] mutex_lock_nested+0x16/0x20 [ 474.711494][T16712] fifo_open+0x159/0xb00 [ 474.716250][T16712] do_dentry_open+0x488/0x1160 [ 474.721557][T16712] vfs_open+0xa0/0xd0 [ 474.726042][T16712] path_openat+0x10e9/0x46e0 [ 474.731145][T16712] do_filp_open+0x1a1/0x280 [ 474.736158][T16712] do_open_execat+0x137/0x690 [ 474.741340][T16712] __do_execve_file.isra.0+0x178d/0x23f0 [ 474.747481][T16712] __x64_sys_execve+0x8f/0xc0 [ 474.752681][T16712] do_syscall_64+0x103/0x610 [ 474.757787][T16712] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.764193][T16712] [ 474.764193][T16712] -> #0 (&sig->cred_guard_mutex){+.+.}: [ 474.771943][T16712] __lock_acquire+0x239c/0x3fb0 [ 474.777309][T16712] lock_acquire+0x16f/0x3f0 [ 474.782322][T16712] __mutex_lock+0xf7/0x1310 [ 474.787355][T16712] mutex_lock_killable_nested+0x16/0x20 [ 474.793428][T16712] do_io_accounting+0x1f4/0x830 [ 474.798794][T16712] proc_tgid_io_accounting+0x23/0x30 [ 474.804616][T16712] proc_single_show+0xf6/0x170 [ 474.809893][T16712] seq_read+0x4db/0x1130 [ 474.814642][T16712] do_iter_read+0x4a9/0x660 [ 474.819661][T16712] vfs_readv+0xf0/0x160 [ 474.824325][T16712] do_preadv+0x1c4/0x280 [ 474.829071][T16712] __x64_sys_preadv+0x9a/0xf0 [ 474.834255][T16712] do_syscall_64+0x103/0x610 [ 474.839366][T16712] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.845936][T16712] [ 474.845936][T16712] other info that might help us debug this: [ 474.845936][T16712] [ 474.856152][T16712] Chain exists of: [ 474.856152][T16712] &sig->cred_guard_mutex --> &pipe->mutex/1 --> &p->lock [ 474.856152][T16712] [ 474.869115][T16712] Possible unsafe locking scenario: [ 474.869115][T16712] [ 474.876555][T16712] CPU0 CPU1 [ 474.881900][T16712] ---- ---- [ 474.887246][T16712] lock(&p->lock); [ 474.891058][T16712] lock(&pipe->mutex/1); [ 474.897893][T16712] lock(&p->lock); [ 474.904229][T16712] lock(&sig->cred_guard_mutex); [ 474.909247][T16712] [ 474.909247][T16712] *** DEADLOCK *** [ 474.909247][T16712] [ 474.917389][T16712] 1 lock held by syz-executor.1/16712: [ 474.922857][T16712] #0: 00000000d2e5b259 (&p->lock){+.+.}, at: seq_read+0x71/0x1130 [ 474.930775][T16712] [ 474.930775][T16712] stack backtrace: [ 474.936662][T16712] CPU: 0 PID: 16712 Comm: syz-executor.1 Not tainted 5.1.0-rc2-next-20190327 #12 [ 474.945753][T16712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.955808][T16712] Call Trace: [ 474.959102][T16712] dump_stack+0x172/0x1f0 [ 474.963455][T16712] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 474.969522][T16712] check_prev_add.constprop.0+0xf11/0x23c0 [ 474.975340][T16712] ? check_usage+0x570/0x570 [ 474.979946][T16712] ? find_held_lock+0x35/0x130 [ 474.984711][T16712] ? graph_lock+0x7b/0x200 [ 474.989129][T16712] ? __lockdep_reset_lock+0x450/0x450 [ 474.994493][T16712] ? find_held_lock+0x35/0x130 [ 474.999269][T16712] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 475.005528][T16712] __lock_acquire+0x239c/0x3fb0 [ 475.010391][T16712] ? lock_downgrade+0x880/0x880 [ 475.015225][T16712] ? mark_held_locks+0xf0/0xf0 [ 475.019974][T16712] lock_acquire+0x16f/0x3f0 [ 475.024463][T16712] ? do_io_accounting+0x1f4/0x830 [ 475.029470][T16712] ? do_io_accounting+0x1f4/0x830 [ 475.034482][T16712] __mutex_lock+0xf7/0x1310 [ 475.038974][T16712] ? do_io_accounting+0x1f4/0x830 [ 475.044259][T16712] ? do_io_accounting+0x1f4/0x830 [ 475.049304][T16712] ? kasan_kmalloc+0x9/0x10 [ 475.053802][T16712] ? kvmalloc_node+0x68/0x100 [ 475.058483][T16712] ? seq_read+0x832/0x1130 [ 475.062911][T16712] ? vfs_readv+0xf0/0x160 [ 475.067234][T16712] ? do_preadv+0x1c4/0x280 [ 475.071661][T16712] ? mutex_trylock+0x1e0/0x1e0 [ 475.076411][T16712] ? __lock_acquire+0x548/0x3fb0 [ 475.081349][T16712] ? percpu_ref_put_many+0x94/0x190 [ 475.086574][T16712] mutex_lock_killable_nested+0x16/0x20 [ 475.092137][T16712] ? mutex_lock_killable_nested+0x16/0x20 [ 475.095014][ T3878] kobject: 'loop5' (000000008ef75967): kobject_uevent_env [ 475.097886][T16712] do_io_accounting+0x1f4/0x830 [ 475.097902][T16712] ? proc_pid_stack+0x2c0/0x2c0 [ 475.097918][T16712] ? kasan_check_read+0x11/0x20 [ 475.097931][T16712] proc_tgid_io_accounting+0x23/0x30 [ 475.097942][T16712] proc_single_show+0xf6/0x170 [ 475.097954][T16712] seq_read+0x4db/0x1130 [ 475.097974][T16712] do_iter_read+0x4a9/0x660 [ 475.097999][T16712] ? dup_iter+0x260/0x260 [ 475.105142][ T3878] kobject: 'loop5' (000000008ef75967): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 475.109974][T16712] vfs_readv+0xf0/0x160 [ 475.109989][T16712] ? lock_downgrade+0x880/0x880 [ 475.110001][T16712] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 475.110014][T16712] ? kasan_check_read+0x11/0x20 [ 475.110031][T16712] ? ksys_dup3+0x3e0/0x3e0 [ 475.110043][T16712] ? kasan_check_read+0x11/0x20 [ 475.110065][T16712] ? _copy_to_user+0xc9/0x120 [ 475.186746][T16712] ? __fget_light+0x1a9/0x230 [ 475.191426][T16712] do_preadv+0x1c4/0x280 [ 475.195661][T16712] ? do_readv+0x290/0x290 [ 475.199982][T16712] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 475.205560][T16712] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 475.211027][T16712] ? do_syscall_64+0x26/0x610 [ 475.215693][T16712] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.221778][T16712] ? do_syscall_64+0x26/0x610 [ 475.227062][T16712] __x64_sys_preadv+0x9a/0xf0 [ 475.231738][T16712] do_syscall_64+0x103/0x610 [ 475.236322][T16712] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.242217][T16712] RIP: 0033:0x458209 [ 475.246099][T16712] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 475.265695][T16712] RSP: 002b:00007f8f04e43c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 475.274108][T16712] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000458209 [ 475.282077][T16712] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 475.290917][T16712] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 475.298900][T16712] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8f04e446d4 [ 475.306876][T16712] R13: 00000000004c4c8e R14: 00000000004d85a8 R15: 00000000ffffffff 16:54:40 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:40 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e13000000000000000000"], 0x24) 16:54:40 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 16:54:40 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:40 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:54:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='io\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x0) [ 475.326831][ T7772] kobject: '0:46' (000000003a7b0e05): kobject_uevent_env [ 475.333920][ T7772] kobject: '0:46' (000000003a7b0e05): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 475.354609][ T7772] kobject: '0:46' (000000003a7b0e05): kobject_cleanup, parent (null) [ 475.367353][ T3878] kobject: 'loop4' (00000000ae93cc9c): kobject_uevent_env 16:54:41 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 16:54:41 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) [ 475.374531][ T3878] kobject: 'loop4' (00000000ae93cc9c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 475.386013][ T7772] kobject: '0:46' (000000003a7b0e05): calling ktype release [ 475.398873][ T7772] kobject: '0:46': free name [ 475.416386][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env 16:54:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r2) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getpgid(r3) connect$inet(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000780)=0xdf) pread64(r0, 0x0, 0x1a0, 0x0) [ 475.448302][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 475.470206][T16733] kobject: '0:46' (000000009ed17366): kobject_add_internal: parent: 'bdi', set: 'devices' [ 475.481282][ T3878] kobject: 'loop2' (0000000001fd7cf8): kobject_uevent_env 16:54:41 executing program 3: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) [ 475.503900][ T3878] kobject: 'loop2' (0000000001fd7cf8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 475.520603][ T3878] kobject: 'loop3' (00000000758ecefd): kobject_uevent_env [ 475.523157][T16733] kobject: '0:46' (000000009ed17366): kobject_uevent_env [ 475.536359][ T3878] kobject: 'loop3' (00000000758ecefd): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:54:41 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r2) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getpgid(r3) connect$inet(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000780)=0xdf) pread64(r0, 0x0, 0x1a0, 0x0) [ 475.552355][T16733] kobject: '0:46' (000000009ed17366): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 475.561128][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 475.589584][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' 16:54:41 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:41 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e13000000000000000000"], 0x24) 16:54:41 executing program 3: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 16:54:41 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) [ 475.648407][ T3878] kobject: 'loop3' (00000000758ecefd): kobject_uevent_env [ 475.673687][ T3878] kobject: 'loop3' (00000000758ecefd): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 475.689290][ T7772] kobject: '0:46' (000000009ed17366): kobject_uevent_env [ 475.701239][ T7772] kobject: '0:46' (000000009ed17366): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 475.711303][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 475.711331][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 475.741926][ T7772] kobject: '0:46' (000000009ed17366): kobject_cleanup, parent (null) [ 475.749313][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 475.756052][ T7772] kobject: '0:46' (000000009ed17366): calling ktype release [ 475.760711][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 475.776497][ T3878] kobject: 'loop3' (00000000758ecefd): kobject_uevent_env [ 475.781166][ T7772] kobject: '0:46': free name [ 475.783751][ T3878] kobject: 'loop3' (00000000758ecefd): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 475.809422][ T3878] kobject: 'loop4' (00000000ae93cc9c): kobject_uevent_env [ 475.821151][ T3878] kobject: 'loop4' (00000000ae93cc9c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 475.829387][T16766] kobject: '0:46' (000000002807f4be): kobject_add_internal: parent: 'bdi', set: 'devices' [ 475.841311][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 475.848807][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 475.852160][T16766] kobject: '0:46' (000000002807f4be): kobject_uevent_env [ 475.862240][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 475.874359][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 475.878969][T16766] kobject: '0:46' (000000002807f4be): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 475.888172][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 475.902189][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 475.914893][ T3878] kobject: 'loop2' (0000000001fd7cf8): kobject_uevent_env [ 475.922753][ T3878] kobject: 'loop2' (0000000001fd7cf8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 475.943865][ T3878] kobject: 'loop4' (00000000ae93cc9c): kobject_uevent_env [ 475.951805][ T7772] kobject: '0:46' (000000002807f4be): kobject_uevent_env [ 475.953244][ T3878] kobject: 'loop4' (00000000ae93cc9c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 475.965126][ T7772] kobject: '0:46' (000000002807f4be): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 475.992115][ T7772] kobject: '0:46' (000000002807f4be): kobject_cleanup, parent (null) [ 476.030691][ T7772] kobject: '0:46' (000000002807f4be): calling ktype release [ 476.041348][ T7772] kobject: '0:46': free name [ 476.052258][ T3878] kobject: 'loop2' (0000000001fd7cf8): kobject_uevent_env [ 476.061502][ T3878] kobject: 'loop2' (0000000001fd7cf8): fill_kobj_path: path = '/devices/virtual/block/loop2' 16:54:41 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:54:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r2) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getpgid(r3) connect$inet(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000780)=0xdf) pread64(r0, 0x0, 0x1a0, 0x0) 16:54:41 executing program 3: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 16:54:41 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:41 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:41 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e13000000000000000000"], 0x24) 16:54:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r2) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getpgid(r3) connect$inet(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000780)=0xdf) pread64(r0, 0x0, 0x1a0, 0x0) [ 476.199398][ T3878] kobject: 'loop5' (000000008ef75967): kobject_uevent_env [ 476.216226][ T3878] kobject: 'loop5' (000000008ef75967): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 476.230800][T16790] kobject: '0:46' (000000005f9f6dad): kobject_add_internal: parent: 'bdi', set: 'devices' 16:54:41 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:41 executing program 3: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) [ 476.255743][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 476.262943][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 476.263657][T16790] kobject: '0:46' (000000005f9f6dad): kobject_uevent_env [ 476.281333][T16790] kobject: '0:46' (000000005f9f6dad): fill_kobj_path: path = '/devices/virtual/bdi/0:46' 16:54:41 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e13000000000000000000000000"], 0x27) 16:54:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r2) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getpgid(r3) connect$inet(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000780)=0xdf) pread64(r0, 0x0, 0x1a0, 0x0) [ 476.320353][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 476.336207][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 476.346725][ T7772] kobject: '0:46' (000000005f9f6dad): kobject_uevent_env [ 476.353797][ T7772] kobject: '0:46' (000000005f9f6dad): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 476.376032][ T3878] kobject: 'loop3' (00000000758ecefd): kobject_uevent_env [ 476.382432][ T7772] kobject: '0:46' (000000005f9f6dad): kobject_cleanup, parent (null) [ 476.383454][ T3878] kobject: 'loop3' (00000000758ecefd): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 476.392800][ T7772] kobject: '0:46' (000000005f9f6dad): calling ktype release [ 476.405003][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env 16:54:42 executing program 3: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) [ 476.418177][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 476.444279][ T7772] kobject: '0:46': free name [ 476.448776][ T3878] kobject: 'loop3' (00000000758ecefd): kobject_uevent_env [ 476.466478][ T3878] kobject: 'loop3' (00000000758ecefd): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 476.482424][ T3878] kobject: 'loop2' (0000000001fd7cf8): kobject_uevent_env [ 476.490509][ T3878] kobject: 'loop2' (0000000001fd7cf8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 476.492777][T16814] kobject: '0:46' (00000000883a3863): kobject_add_internal: parent: 'bdi', set: 'devices' [ 476.532737][T16814] kobject: '0:46' (00000000883a3863): kobject_uevent_env [ 476.543946][T16814] kobject: '0:46' (00000000883a3863): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 476.571323][ T7772] kobject: '0:46' (00000000883a3863): kobject_uevent_env [ 476.578603][ T7772] kobject: '0:46' (00000000883a3863): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 476.588673][ T7772] kobject: '0:46' (00000000883a3863): kobject_cleanup, parent (null) [ 476.597685][ T7772] kobject: '0:46' (00000000883a3863): calling ktype release [ 476.605053][ T7772] kobject: '0:46': free name [ 476.611043][ T3878] kobject: 'loop2' (0000000001fd7cf8): kobject_uevent_env [ 476.618720][ T3878] kobject: 'loop2' (0000000001fd7cf8): fill_kobj_path: path = '/devices/virtual/block/loop2' 16:54:42 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:54:42 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x1a8) 16:54:42 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r1) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getpgid(r2) connect$inet(r0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000780)=0xdf) 16:54:42 executing program 3: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 16:54:42 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e13000000000000000000000000"], 0x27) 16:54:42 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 477.013308][ T3878] kobject: 'loop4' (00000000ae93cc9c): kobject_uevent_env [ 477.020591][ T3878] kobject: 'loop4' (00000000ae93cc9c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 477.070073][ T3878] kobject: 'loop5' (000000008ef75967): kobject_uevent_env [ 477.089895][T16826] kobject: '0:46' (00000000eabc3094): kobject_add_internal: parent: 'bdi', set: 'devices' [ 477.100509][ T3878] kobject: 'loop5' (000000008ef75967): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 477.106503][T16826] kobject: '0:46' (00000000eabc3094): kobject_uevent_env 16:54:42 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r1) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getpgid(r2) connect$inet(r0, 0x0, 0x0) 16:54:42 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) [ 477.118581][T16826] kobject: '0:46' (00000000eabc3094): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 477.132036][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 477.151784][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' 16:54:42 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e13000000000000000000000000"], 0x27) 16:54:42 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x1a8) 16:54:42 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) [ 477.184854][ T3878] kobject: 'loop3' (00000000758ecefd): kobject_uevent_env [ 477.195682][ T3878] kobject: 'loop3' (00000000758ecefd): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 477.215189][ T7772] kobject: '0:46' (00000000eabc3094): kobject_uevent_env [ 477.221598][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env 16:54:42 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r0) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getpgid(r1) [ 477.248095][ T7772] kobject: '0:46' (00000000eabc3094): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 477.264576][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 477.279289][ T7772] kobject: '0:46' (00000000eabc3094): kobject_cleanup, parent (null) [ 477.293421][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 477.301609][ T7772] kobject: '0:46' (00000000eabc3094): calling ktype release [ 477.309332][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 477.346564][ T7772] kobject: '0:46': free name [ 477.353662][ T3878] kobject: 'loop2' (0000000001fd7cf8): kobject_uevent_env [ 477.369346][ T3878] kobject: 'loop2' (0000000001fd7cf8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 477.380551][T16858] kobject: '0:46' (0000000003168d5e): kobject_add_internal: parent: 'bdi', set: 'devices' [ 477.391427][T16858] kobject: '0:46' (0000000003168d5e): kobject_uevent_env [ 477.399311][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 477.399615][T16858] kobject: '0:46' (0000000003168d5e): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 477.419015][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 477.433501][ T7772] kobject: '0:46' (0000000003168d5e): kobject_uevent_env [ 477.440710][ T7772] kobject: '0:46' (0000000003168d5e): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 477.450911][ T7772] kobject: '0:46' (0000000003168d5e): kobject_cleanup, parent (null) [ 477.460276][ T7772] kobject: '0:46' (0000000003168d5e): calling ktype release [ 477.467768][ T7772] kobject: '0:46': free name [ 477.473660][ T3878] kobject: 'loop2' (0000000001fd7cf8): kobject_uevent_env [ 477.481274][ T3878] kobject: 'loop2' (0000000001fd7cf8): fill_kobj_path: path = '/devices/virtual/block/loop2' 16:54:43 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:54:43 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 16:54:43 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x1a8) 16:54:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r0) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) 16:54:43 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e1300000000000000000000000000"], 0x28) 16:54:43 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 477.893807][ T3878] kobject: 'loop4' (00000000ae93cc9c): kobject_uevent_env [ 477.902285][ T3878] kobject: 'loop4' (00000000ae93cc9c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 477.962752][ T3878] kobject: 'loop5' (000000008ef75967): kobject_uevent_env [ 477.986603][ T3878] kobject: 'loop5' (000000008ef75967): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 477.988118][T16870] kobject: '0:46' (00000000221ef88d): kobject_add_internal: parent: 'bdi', set: 'devices' 16:54:43 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 16:54:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r0) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) 16:54:43 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) [ 478.012916][T16870] kobject: '0:46' (00000000221ef88d): kobject_uevent_env [ 478.023221][T16870] kobject: '0:46' (00000000221ef88d): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 478.050156][ T3878] kobject: 'loop3' (00000000758ecefd): kobject_uevent_env 16:54:43 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, 0x0}, 0x1a8) 16:54:43 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e1300000000000000000000000000"], 0x28) [ 478.067240][ T3878] kobject: 'loop3' (00000000758ecefd): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 478.098979][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 478.107362][ T7772] kobject: '0:46' (00000000221ef88d): kobject_uevent_env 16:54:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r0) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) [ 478.116815][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 478.128585][ T7772] kobject: '0:46' (00000000221ef88d): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 478.137764][ T3878] kobject: 'loop3' (00000000758ecefd): kobject_uevent_env [ 478.149990][ T3878] kobject: 'loop3' (00000000758ecefd): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 478.156244][ T7772] kobject: '0:46' (00000000221ef88d): kobject_cleanup, parent (null) [ 478.161822][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 478.186958][ T7772] kobject: '0:46' (00000000221ef88d): calling ktype release [ 478.191819][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 478.200132][ T7772] kobject: '0:46': free name [ 478.213268][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 478.228645][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 478.243013][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 478.247498][T16896] kobject: '0:46' (0000000052d053d7): kobject_add_internal: parent: 'bdi', set: 'devices' [ 478.252848][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 478.260669][T16896] kobject: '0:46' (0000000052d053d7): kobject_uevent_env [ 478.278315][ T3878] kobject: 'loop2' (0000000001fd7cf8): kobject_uevent_env [ 478.278481][T16896] kobject: '0:46' (0000000052d053d7): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 478.295036][ T3878] kobject: 'loop2' (0000000001fd7cf8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 478.324427][ T7772] kobject: '0:46' (0000000052d053d7): kobject_uevent_env [ 478.338495][ T7772] kobject: '0:46' (0000000052d053d7): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 478.351650][ T7772] kobject: '0:46' (0000000052d053d7): kobject_cleanup, parent (null) [ 478.362689][ T7772] kobject: '0:46' (0000000052d053d7): calling ktype release [ 478.371729][ T7772] kobject: '0:46': free name [ 478.378062][ T3878] kobject: 'loop2' (0000000001fd7cf8): kobject_uevent_env [ 478.386485][ T3878] kobject: 'loop2' (0000000001fd7cf8): fill_kobj_path: path = '/devices/virtual/block/loop2' 16:54:44 executing program 5: writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)="85252025057136d1c152d12fdbe290e5c90757a971799bb070c4a15e8fdb56f397adf1254e8c92de2c9eec4937ea56211cb34170233838e80383e709304ca8530590602ff73280d578d7bfb679731472a868a657cd1c0573ceaf4703be8e3dc1859c63ad37fad1eb99fa17afb13be68b5390cd627c4f4da9278d2b101137725818a7bc68466aae37", 0x88}], 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:54:44 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 16:54:44 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, 0x0}, 0x1a8) 16:54:44 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r0) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 16:54:44 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="290000000600000000000000000000000100000000000002176e1300000000000000000000000000"], 0x28) 16:54:44 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, 0x0, 0x0, 0x0) [ 478.768756][ T3878] kobject: 'loop4' (00000000ae93cc9c): kobject_uevent_env [ 478.775973][ T3878] kobject: 'loop4' (00000000ae93cc9c): fill_kobj_path: path = '/devices/virtual/block/loop4' 16:54:44 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r0) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) [ 478.846337][ T3878] kobject: 'loop5' (000000008ef75967): kobject_uevent_env [ 478.856507][ T3878] kobject: 'loop5' (000000008ef75967): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 478.868209][T16913] kobject: '0:46' (000000001b958ebc): kobject_add_internal: parent: 'bdi', set: 'devices' 16:54:44 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, 0x0}, 0x1a8) [ 478.902029][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 478.909849][T16913] kobject: '0:46' (000000001b958ebc): kobject_uevent_env [ 478.926456][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 478.929468][T16913] kobject: '0:46' (000000001b958ebc): fill_kobj_path: path = '/devices/virtual/bdi/0:46' 16:54:44 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r0) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) [ 478.958664][ T3878] kobject: 'loop3' (00000000758ecefd): kobject_uevent_env [ 478.977118][ T3878] kobject: 'loop3' (00000000758ecefd): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 478.988600][ T7772] kobject: '0:46' (000000001b958ebc): kobject_uevent_env 16:54:44 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) [ 479.005288][ T7772] kobject: '0:46' (000000001b958ebc): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 479.007479][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 479.022217][ T7772] kobject: '0:46' (000000001b958ebc): kobject_cleanup, parent (null) [ 479.045230][ T7772] kobject: '0:46' (000000001b958ebc): calling ktype release 16:54:44 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r0) eventfd(0x100) semget$private(0x0, 0x0, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) [ 479.055749][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 479.057537][ T7772] kobject: '0:46': free name [ 479.083430][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 479.090946][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 479.102164][ T3878] kobject: 'loop2' (0000000001fd7cf8): kobject_uevent_env 16:54:44 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) [ 479.109935][ T3878] kobject: 'loop2' (0000000001fd7cf8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 479.130737][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 479.143176][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 479.154374][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 479.161864][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 479.173454][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 479.180747][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 479.192353][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 479.199675][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' 16:54:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:54:45 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r0) eventfd(0x100) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 16:54:45 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x1a8) 16:54:45 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, 0x0, 0x0, 0x0) [ 479.655503][ T3878] kobject: 'loop4' (00000000ae93cc9c): kobject_uevent_env [ 479.662827][ T3878] kobject: 'loop4' (00000000ae93cc9c): fill_kobj_path: path = '/devices/virtual/block/loop4' 16:54:45 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) [ 479.711791][ T3878] kobject: 'loop5' (000000008ef75967): kobject_uevent_env [ 479.726561][ T3878] kobject: 'loop5' (000000008ef75967): fill_kobj_path: path = '/devices/virtual/block/loop5' 16:54:45 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 16:54:45 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) [ 479.755016][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 479.765774][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 479.788989][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env 16:54:45 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) [ 479.801720][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' 16:54:45 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) [ 479.850623][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 479.859783][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 479.880168][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env 16:54:45 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 16:54:45 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) [ 479.894274][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 479.918175][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 479.926143][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' 16:54:45 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) [ 479.986777][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 479.993955][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 480.009561][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 480.024292][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 480.039338][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 480.046770][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' 16:54:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:54:46 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 16:54:46 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:46 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, 0x0, 0x0, 0x0) [ 480.529431][ T3878] kobject: 'loop4' (00000000ae93cc9c): kobject_uevent_env [ 480.537828][ T3878] kobject: 'loop4' (00000000ae93cc9c): fill_kobj_path: path = '/devices/virtual/block/loop4' 16:54:46 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 16:54:46 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) [ 480.588910][ T3878] kobject: 'loop5' (000000008ef75967): kobject_uevent_env [ 480.601290][ T3878] kobject: 'loop5' (000000008ef75967): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 480.622101][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env 16:54:46 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x108) [ 480.631981][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 480.644401][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 480.654748][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' 16:54:46 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 16:54:46 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x108) [ 480.701319][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 480.710203][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' 16:54:46 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 16:54:46 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x108) 16:54:46 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) [ 480.768723][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 480.776058][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 480.794121][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 480.805375][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 480.843648][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 480.851357][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 480.862446][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 480.871165][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' 16:54:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:54:47 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:47 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 16:54:47 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) [ 481.384601][ T3878] kobject: 'loop4' (00000000ae93cc9c): kobject_uevent_env [ 481.391981][ T3878] kobject: 'loop4' (00000000ae93cc9c): fill_kobj_path: path = '/devices/virtual/block/loop4' 16:54:47 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) [ 481.426689][ T3878] kobject: 'loop5' (000000008ef75967): kobject_uevent_env [ 481.433878][ T3878] kobject: 'loop5' (000000008ef75967): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 481.461014][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env 16:54:47 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 16:54:47 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) [ 481.468551][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' 16:54:47 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) [ 481.512192][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 481.519669][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 481.541391][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env 16:54:47 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:47 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:47 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 16:54:47 executing program 1: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) [ 481.556720][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 481.577254][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 481.594242][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 481.643782][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 481.654414][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 481.666097][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env [ 481.674222][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 481.692866][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 481.702098][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' 16:54:47 executing program 5: writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:54:47 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:47 executing program 1: request_key(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0x0) 16:54:47 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) [ 482.230455][ T3878] kobject: 'loop4' (00000000ae93cc9c): kobject_uevent_env [ 482.237753][ T3878] kobject: 'loop4' (00000000ae93cc9c): fill_kobj_path: path = '/devices/virtual/block/loop4' 16:54:47 executing program 0: r0 = socket$inet(0x2, 0x200000003, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, 0x0, &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'n*0Ek\x88k\xc2\x16[A\xfei\x00', 'yam0\x00', 'yam0\x00', 'lo\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, 0x0, &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', 'ip6g\x03e0\x00\x91\x00\x00\x00\x00\x00\xfb\xff', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1a8) 16:54:47 executing program 1: request_key(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0x0) [ 482.282541][ T3878] kobject: 'loop5' (000000008ef75967): kobject_uevent_env [ 482.297330][ T3878] kobject: 'loop5' (000000008ef75967): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 482.321418][ T3878] kobject: 'loop0' (00000000019c1de9): kobject_uevent_env 16:54:48 executing program 1: request_key(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0x0) [ 482.341486][ T3878] kobject: 'loop0' (00000000019c1de9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 482.378587][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env 16:54:48 executing program 1: request_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, 0x0, 0x0) 16:54:48 executing program 1: request_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, 0x0, 0x0) [ 482.388204][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 482.430310][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env 16:54:48 executing program 1: request_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, 0x0, 0x0) [ 482.437749][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 482.480041][ T3878] kobject: 'loop1' (0000000019b2ae92): kobject_uevent_env [ 482.487280][ T3878] kobject: 'loop1' (0000000019b2ae92): fill_kobj_path: path = '/devices/virtual/block/loop1' 16:54:48 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 16:54:48 executing program 5: writev(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) [ 483.091354][ T3878] kobject: 'loop4' (00000000ae93cc9c): kobject_uevent_env [ 483.098697][ T3878] kobject: 'loop4' (00000000ae93cc9c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 483.126597][ T3878] kobject: 'loop5' (000000008ef75967): kobject_uevent_env [ 483.133776][ T3878] kobject: 'loop5' (000000008ef75967): fill_kobj_path: path = '/devices/virtual/block/loop5' 16:54:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r2) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getpgid(r3) connect$inet(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000780)=0xdf) pread64(r0, 0x0, 0x1a0, 0x0) 16:54:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r2) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getpgid(r3) connect$inet(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000780)=0xdf) pread64(r0, 0x0, 0x1a0, 0x0) 16:54:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r2) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getpgid(r3) connect$inet(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000780)=0xdf) pread64(r0, 0x0, 0x1a0, 0x0) 16:54:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f00000006c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="4760f3971e52685826217ef086af7ae4bec251eccfa1a0630e5eff4f3f91c0811738d70633f5db889a3bb5cb7d0f9212eed786dc39f98bfdfd9f754b178b31a328457053ba30991a6a9bd41c73851611e519031aea74dca45a83251a09505003fba0e3213faa461a9d8354926e5dafc8b6255c1de65b3aa8", 0x78, 0x0) keyctl$link(0x8, 0x0, r2) eventfd(0x100) semget$private(0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f00000007c0)=@HCI_EVENT_PKT={0x4, "6c0feec11fe4e5b6a9ccfa8eefedcf570e35d1b7269fb4c095b969a2c2e0a5c7e524cdd7f7b2e1cd6552cc55c0bbbfac5d16289b01c1610ca0ab80b3eee4e495c87d2aeaa16794159878439a06a4202ea68b1f4afe51d9985a1c"}, 0x5b) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getpgid(r3) connect$inet(r1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000780)=0xdf) pread64(r0, 0x0, 0x1a0, 0x0) 16:54:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/psched\x00') socket$inet6(0xa, 0x80001