00000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x3, 0x2040) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0x6) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f00000002c0), 0x1, r4, 0x10, 0x0, @ib={0x1b, 0x3, 0x7, {"bca16923f166949c679f4fc2cdaa90b3"}, 0x7, 0x20000000000, 0x6}}}, 0xa0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SG_GET_COMMAND_Q(r5, 0x2270, &(0x7f0000000200)) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000140)="b9800000c00f3235001000000f300f35b9800000c00f3235000100000f300f322e0f189e8d906423c744240000000100c7442402f3ff0000c7442406000000000f01142447d8f2460f01f8b9800000c00f3235000800000f30c7442400c67abfedc744240200480000c7442406000000000f011c24", 0x75}], 0x1, 0x4, &(0x7f00000001c0)=[@cstype0={0x4, 0xa}], 0x1) 00:41:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x1100000000000000) 00:41:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca}], 0x0, &(0x7f0000000000)=ANY=[]) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1000000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40485404, &(0x7f00000004c0)={{0x3, 0x1, 0x6, 0x2, 0x5}, 0x2, 0x4}) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f00000000c0)=@buf={0x93, &(0x7f0000000000)="b3f5a4cc31211a653bf2f3a01a7f6ce82fa99753fffe4612c1f1aa293c504b812255808ff4f4b8a9462dbb44ea860878dd3a116c0713595fb2e4650fe13bde9af1b160efc59d096cdfa350b729f760c507b687ebe720fd9122242d0f21d594b8c68c0252ee58c74fba09cec3297300357aed1c365c3b8f7aff6f04479f5fd493ba1ed000bee44c2d6425c9c2d1584b03dc1dca"}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/235, 0x200002ab}], 0x1, &(0x7f0000000300)=""/210, 0xd2}, 0x0) fchdir(r1) sync_file_range(r0, 0x1f, 0x5, 0x577d3a7e92c51849) 00:41:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000004300)={0x0, 0x0, 0x2080}) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f00000001c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1]}) write$P9_RXATTRWALK(r5, &(0x7f0000000080)={0xf, 0x1f, 0x2, 0x7f}, 0xf) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000280)={0x6, 0xf, 0x4, 0x80000000, {}, {0x5, 0x3, 0xff, 0x7, 0xb821000000, 0x0, "e5ef8e05"}, 0x10000, 0x6, @userptr=0x1, 0x4}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0xf1ccbaea6c329309, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000140)={'bridge0\x00', @local}) write$binfmt_elf32(r2, &(0x7f0000001780)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x9, 0x2e, 0xf3c, 0xfb03, 0x2, 0x6, 0x1d, 0x30d, 0x38, 0x26d, 0xffffffff, 0x3, 0x20, 0x2, 0x5, 0x2, 0xff}, [{0x7, 0x3, 0x9, 0x7fffffff, 0x2, 0xb619, 0x3, 0x40}, {0x3, 0x200, 0x9, 0x8000, 0x3ff, 0x5cf, 0x20, 0x10001}], "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", [[], [], [], []]}, 0x1478) ioctl$KVM_RUN(r5, 0xae80, 0x0) 00:41:47 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x10000) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) exit_group(0xfff7fffffffffff8) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0x8000, 0x2, 0x1, 0x2, 0x1, 0x7fec1de2, 0xfff, 0x7, 0x0, 0xffffffff}) r4 = fcntl$getown(r0, 0x9) capset(&(0x7f00000001c0)={0x20071026, r4}, &(0x7f0000000080)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000340)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000000000000004000000000000000000005b0d72f3a64dd5c11f3a932c6ede470000000000000000000000000000000008000000000000000000fc554b8e631cb6bde1e72c000000000000000000000000000081873f00000000000000000000004a798c36adaf8647602a622a65d33330c7239138739c1a7c8fddcb2acbccbe518882dde13b715c00000000000000000000e8ef079e9fcd603faafadfddff855ad18c22bd34e54cfba0e21b90bffd7c914c904bf0796a78dc0d0e2c42671056dbe980721f28d5f1290ebc8572ba9e4dd7ec2862cc19e70dcd2d784c1c3e40ea5c54cee68c0075f8f7b96549f9f9aef7ef8e60e5cb771d724d7b39fc7962fa5853d057157a5a4c607981055f60"], 0x68) sendfile(r0, r2, 0x0, 0x2007ff) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) 00:41:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x103ff, 0x3, 0x4, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) 00:41:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca}], 0x0, &(0x7f0000000000)=ANY=[]) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x400000000000000) 00:41:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca}], 0x0, &(0x7f0000000000)=ANY=[]) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:47 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) bind$llc(r0, &(0x7f0000000140)={0x1a, 0x31f, 0x401, 0xa46, 0x6, 0x80, @dev={[], 0x1e}}, 0x10) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) utimensat(r0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={{}, {0x77359400}}, 0x100) pipe2$9p(&(0x7f00000000c0), 0x4000) syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x8, 0x10001) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1]}) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000180)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:41:47 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x2000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:41:47 executing program 1: clone(0x100a0000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) sendfile(r0, r1, 0x0, 0x2007ff) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000280)={0xb1, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) getrlimit(0xc, &(0x7f0000000000)) 00:41:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r4 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0) ioctl$RTC_ALM_READ(r4, 0x80247008, &(0x7f00000000c0)) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:41:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x4000000) 00:41:48 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x10, &(0x7f00000001c0)={0xff0f}, &(0x7f0000000200)=0x10) close(r0) 00:41:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x8000) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:41:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x400000000000033, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 00:41:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0xfdfdffff) 00:41:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:48 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xc0fe, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:41:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = dup(r2) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000040)=0x3, 0xff03) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:41:48 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) sendfile(r0, r1, 0x0, 0x2007ff) 00:41:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x700) 00:41:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x40000, 0x0) ioctl$KVM_SET_FPU(r3, 0x41a0ae8d, &(0x7f0000000280)={[], 0x0, 0xfff, 0x400, 0x0, 0xa6, 0x0, 0xf000, [], 0x7f}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f00000000c0)=0x3, &(0x7f0000000140)=0x4) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:41:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x2) 00:41:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:41:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0xfffffdfd) 00:41:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:49 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x800000000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:41:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x80ffff00000000) 00:41:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000080)) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1000001]}) setxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:41:49 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000cc0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000c80)=',\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_dev$dmmidi(&(0x7f0000000d00)='/dev/dmmidi#\x00', 0x40, 0x80) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x1) r3 = syz_open_procfs(r1, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$rds(r3, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/180, 0xb4}, {&(0x7f0000000280)=""/232, 0xe8}, {&(0x7f0000000380)=""/135, 0x87}, {&(0x7f0000000440)=""/204, 0xcc}], 0x4, &(0x7f0000000880)=[@mask_fadd={0x58, 0x114, 0x8, {{0x8, 0xfffffffffffffff8}, &(0x7f0000000040)=0x80000001, &(0x7f00000000c0)=0x200, 0x3, 0x1000, 0x6, 0x2e5, 0x33, 0x100000000}}, @cswp={0x58, 0x114, 0x7, {{0xffffffff, 0x7}, &(0x7f0000000200)=0x3, &(0x7f0000000540)=0x7fff, 0x8, 0x10001, 0xffff, 0x6, 0x40, 0x7}}, @rdma_args={0x48, 0x114, 0x1, {{0x9, 0x6}, {&(0x7f0000000580)=""/209, 0xd1}, &(0x7f0000000780)=[{&(0x7f0000000680)=""/165, 0xa5}, {&(0x7f0000000740)=""/35, 0x23}], 0x2, 0x21, 0x9}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000007c0)=""/93, 0x5d}, &(0x7f0000000840), 0x48}}], 0x128, 0x4000}, 0x1) recvmmsg(r4, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000d80)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000e40)={&(0x7f0000000d40), 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x3c, r5, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3c}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_AF={0x8, 0x2, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dsp\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x2007ff) r6 = geteuid() syz_mount_image$jfs(&(0x7f0000000a00)='jfs\x00', &(0x7f0000000a40)='./file0\x00', 0x3, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000a80)="d1cb68cfffa8ede6e0d005f36d7ce2bb152ffd996b154b9593f35ce98f4455f1b90d8c59d90c36af235df4eb1c02c36430c4446b93ee3ded199a2ea4fa3c5df5c719d60d8016ea51a4d107f4dda158091672169081bb24184e5dc304", 0x5c, 0x3}], 0x8000, &(0x7f0000000b40)={[{@discard_size={'discard', 0x3d, 0x4}}, {@nodiscard='nodiscard'}, {@resize_size={'resize', 0x3d, 0x200}}, {@integrity='integrity'}, {@iocharset={'iocharset', 0x3d, 'cp860'}}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@obj_user={'obj_user', 0x3d, 'stat\x00'}}, {@fowner_lt={'fowner<', r6}}, {@subj_type={'subj_type', 0x3d, 'r^*vboxnet0'}}, {@smackfsroot={'smackfsroot', 0x3d, '^@'}}, {@obj_type={'obj_type', 0x3d, '{\fposix_acl_access$'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x77, 0x77, 0x34, 0x65, 0x0, 0x77, 0x37], 0x2d, [0x62, 0x0, 0x31, 0x7b], 0x2d, [0x61, 0x30, 0x36, 0x3d], 0x2d, [0x33, 0x66, 0x31, 0x34], 0x2d, [0x36, 0x73, 0x61, 0x32, 0x63, 0x34, 0x34]}}}]}) 00:41:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x80ffff) 00:41:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:50 executing program 1: clone(0x2102021fbd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) gettid() getpgid(0xffffffffffffffff) r1 = fcntl$getown(r0, 0x9) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000140), &(0x7f00000001c0)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="d29ecc1aa307f09852c4f4b58544d79c", 0x10) syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x2, 0x2) r2 = syz_open_procfs(r1, &(0x7f0000000180)='mountinfo\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r2, 0xc034564b, &(0x7f00000000c0)={0x0, 0x3239565f, 0x2, 0x6, 0x3, @stepwise={{0x3ff, 0x6}, {0x3, 0x8ddf}, {0xc2, 0x3}}}) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000200)) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000280)) sendfile(r0, r2, 0x0, 0x2007ff) 00:41:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000080)=0x80000) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:41:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x700000000000000) 00:41:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2dea, 0x200000) getsockopt$IPT_SO_GET_ENTRIES(r4, 0x0, 0x41, &(0x7f0000000280)={'filter\x00', 0xfd, "1a8385c527a7b2ad2fc1e343fbd2f70c9447dc557c00b48816aaee594ab3bce2ddb4143f61f1a2ec9ef033dcff11ef7a6cd050b1d9b73ff6ecf2f8a7cc91a41ac0bd28d98dc254cc7c581699d835cf8e6ef181402165a2f8becf110061977d7238aced7f80e128d2e893940aff7404496d88980d98ebc74c94f2be2d1845bd8451ec3a8fa051940730f062cdd2e311fe3bca95a09fa6013f1831747f7dabc9dc2107a0a4a3d36fe78e8965084d713041ad82182d5e2aa66a106c0be7e3c954a15636e894285104fad40556013c22f2f36bf51e5051be9a0977aea8b353941cf6d685f93bda321b8ad005e290073e998ec3937d4cd0dda06046561da5fa"}, &(0x7f00000001c0)=0x121) setsockopt$IP_VS_SO_SET_DELDEST(r4, 0x0, 0x488, &(0x7f00000003c0)={{0x84, @multicast2, 0x4e20, 0x0, 'sed\x00', 0x20, 0x9, 0x72}, {@local, 0x4e21, 0x4, 0xd429, 0x2, 0x4}}, 0x44) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) utimensat(r4, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{0x0, 0x2710}}, 0x100) 00:41:50 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x700000000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:41:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0xfdfdffff00000000) 00:41:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x42, 0x0) write$P9_RAUTH(r4, &(0x7f00000000c0)={0x14, 0x67, 0x1, {0x4, 0x2, 0x6}}, 0x14) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:41:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x300000002000000) 00:41:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000080)=0x10000) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1]}) open_by_handle_at(r3, &(0x7f0000000140)={0xf0, 0x2, "873e12e536d72a30fe2bc16924237e7694227d2fd192aaf559c17c01eafe0bb3ec401ce2ec13e6744a9e19f1e1a219798b90209a40da39744151d15a469a68b881b1d27a67ea2c877efd1bee74bafa0878586bb8f251f462fad29b169d3559a5cfa112bd545e318d0ceb25a4f5265c7bd2cd2202d201418b7bd198dd8c0bb0fe6d71845ad7532c6c35961eafb93be66a1561678b15209111c7a067b72b521adb6079f4ab9ddf390ae5a18e9ddf2a22fff83b4321216abab8825aedf7661bbe4beafc6de0369eb6027c646a768ada56ad7ea2d79a1c9dba11aed339ed7d3cc063bf71a77eec21f4a9"}, 0x4000) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:41:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/fscreate\x00') ioctl$TCSBRKP(r0, 0x5425, 0x8) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') eventfd2(0x200, 0x80001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000040)={'sit0\x00', {0x2, 0x4e23, @broadcast}}) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) sendfile(r1, r2, 0x0, 0x2007ff) 00:41:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, 0x0, &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x4000) 00:41:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmdt(r2) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x100, 0x0) write$P9_RCLUNK(r4, &(0x7f00000000c0)={0x7, 0x79, 0x2}, 0x7) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000140)={0x10200, 0x3, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 00:41:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0xb752fcae7f0000) 00:41:51 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xfc, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:41:51 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getrusage(0x0, &(0x7f0000000140)) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) sendfile(r0, r1, 0x0, 0x2007ff) 00:41:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, 0x0, &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r4 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x81, 0xc84c0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000280)={{{@in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) write$P9_RCREATE(r4, &(0x7f00000000c0)={0xfffffffffffffd06, 0x73, 0x1, {{0xaf, 0x0, 0x3}, 0x2}}, 0x18) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r5, 0x200) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:41:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0xf000000) 00:41:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, 0x2010, r4, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$BLKRESETZONE(r4, 0x40101283, &(0x7f00000000c0)={0x20, 0x59}) setsockopt$bt_BT_POWER(r4, 0x112, 0x9, &(0x7f0000000140)=0x7, 0x1) 00:41:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x60182300) 00:41:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, 0x0, &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, 0x0, &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:41:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x11000000) 00:41:52 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:41:52 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x3) capset(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2000000}) sendfile(r0, r1, 0x0, 0x2007ff) 00:41:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:52 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) capset(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x4}) sendfile(r0, r1, 0x0, 0x2007ff) 00:41:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, 0x0, &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x231860) 00:41:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:41:53 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x100000000, 0x240240) fcntl$notify(r0, 0x402, 0x28) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) sendfile(r1, r2, 0x0, 0x2007ff) 00:41:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x200000003) 00:41:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:53 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000002480)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000000040)="04bc77fc82d8d39f24595be60cf816989172ffd255b82eca1e23f0e616a7dec9f5c89b", 0x23}, {&(0x7f00000000c0)="69a98be74f822a504603a474476a462b8538ce710cb3", 0x16}, {&(0x7f0000001280)="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", 0x1000}, {&(0x7f0000000140)="b76153db14c6d38437074cebc64274b1b12619ceb3b4d6aa46b9a9a77a68073a4a5d12b5b1c39fe0bdf462ec9914746b7a5417a943d784500c0e51677f1ba7e67e312b8c2f09", 0x46}, {&(0x7f00000001c0)="5d74233fbd17ed84839d01341c2b9c7dfeeded6f155715ee5381173854abf1989133e8b1b0a07c70603b7bb6bc892cdf40441bf49c5698d9b4a898b4238fec7c58fb5207f45796", 0x47}, {&(0x7f0000002280)="7ec144b6267c200d32d41964db16e99e97cc19fd1c525b877518186dda005d931f90c6272632f08f7d3da27749cd200776907aab633aeb565597917d34814de13b28b7b2aa48e838e626db592141dca0c2e786cc74f3d86e23b13717eb4fd23ce4de359b25163bddebce29caa225c56ef5d7995f15f0bbc3b5a5d27a7e307d3d9dff8896efd8e30406578afef3f3f081aee7fbacf4103eeaaa613b6f46551e8b4dfda21a570143ab88e725aec242d4c6e29303fb357e2df358896370bc07c7f769f59b417df338e4962841d31d13253c81a080d9a44ff94e665ae14c1d569eaf3b14e843c1f416227fa3ee4324adaf5b5560", 0xf2}, {&(0x7f0000002380)="68694564136c583d8e7632819d066de78624ea20b7805d1f685243777972bdefdcba5a247049b21830918759133525f25a1192e87145f3b277c5e857f7e5301cda4f7700ca55122b10c631a54abccddec9a30a2b53ba4c44bf72cc851724bc9469fab1f68988f53887bad32ed1c9d6e64f3f172fb7ee977dd224b4f864d06bd7b7eb96c76cd07cc6f3e003d58133ff40d95d95a0e4edc549a217939829965d7b6ea02428452a566f17621633ef86751caae7e05b91d792484d9ce5bd8ae3b8caf4e552b8ecacbfba4a5f9ae334c65d0c60130a41", 0xd4}], 0x8, 0xf) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40000) sendfile(r0, r1, 0x0, 0x2007ff) 00:41:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:53 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x8004020000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:41:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:41:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x3) 00:41:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0xf00000000000000) 00:41:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) 00:41:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x40000000) 00:41:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:41:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:54 executing program 1: socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000380)={0xffffffffffffffff}) fsetxattr$security_ima(r0, &(0x7f00000003c0)='security.ima\x00', &(0x7f0000000400)=@md5={0x1, "5104180bc94461dfe9e143da9c923fa7"}, 0x11, 0x3) r1 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x0, 0x206002) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f00000002c0)=0x4, &(0x7f0000000300)=0x4) setsockopt$inet6_dccp_int(r1, 0x21, 0x7, &(0x7f0000000440)=0xffffffffffffff01, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) recvmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}, 0xff}], 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e21, 0x3, @dev={0xfe, 0x80, [], 0x20}, 0x1}, @in6={0xa, 0x4e22, 0xf72, @ipv4={[], [], @remote}, 0x7}, @in6={0xa, 0x4e21, 0xd6dc, @mcast1, 0x8}, @in={0x2, 0x4e21, @broadcast}]}, &(0x7f00000000c0)=0x10) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000001c0)={r4, 0x6, 0x4b, "38b5762d860fed640c2126519f47cee62942d7b5304724c898db654444bf8cf69ec84768d369e4194ae6fa5694502c97392b2fb22d32612247978352bb50dc40a564a6864a039f4c984cb8"}, 0x53) ioctl$VIDIOC_G_STD(r3, 0x80085617, &(0x7f0000000340)) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) sendfile(r2, r3, 0x0, 0x2007ff) 00:41:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0xf00) 00:41:54 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x8dffffff00000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:41:54 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0x6, 0x0, 0x2, 0x1}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f00000000c0)={0x5, r3}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0xb0, r4, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x80000000}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x78b}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4a0174a9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7fffffff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x800}, 0x8000) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)={0x0, 0x0, 0x10001, 0x0, 0x0, 0xffffffffffffffff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x40000, 0x0) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x3) sendfile(r0, r1, 0x0, 0x2007ff) 00:41:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) 00:41:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0xf) 00:41:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:41:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x4) 00:41:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) 00:41:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:41:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x100000000000000) 00:41:55 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x40000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:41:55 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x800, 0x0) accept4$packet(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x14, 0x80000) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) sendfile(r1, r2, 0x0, 0x2007ff) 00:41:55 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x1c1801, 0x0) accept$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000000)={[{0x3ff, 0xfffffffffffffffa, 0x3, 0x8, 0x8, 0x3ff, 0x24, 0x2, 0x5, 0xffff, 0x8, 0x200, 0x4e8f99dc}, {0x9395, 0x5, 0x9, 0x1, 0xfffffffffffffff7, 0x1, 0x2, 0x9, 0x1f, 0x10000, 0x3000000000, 0xfffffffffffffff9, 0xfff}, {0x6, 0x0, 0x64f261f1, 0x401, 0x9, 0x2, 0x3, 0x1, 0x0, 0x2, 0x92, 0x6, 0x3}], 0x7}) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) sendfile(r1, r2, 0x0, 0x2007ff) 00:41:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:41:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x300000000000000) 00:41:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x7faefc52b700) 00:41:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:41:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:41:56 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x11, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:41:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f00000001c0)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) flistxattr(r0, &(0x7f0000000280)=""/176, 0xb0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000140)={0x8000, 0x8a6, &(0x7f0000000080)="f641cb0acd284b3ec9953556691f0fff7dcf727a3a8c875859be8d71274dc6681a29fa7c2a86bdcd", &(0x7f00000000c0)="933300228ac1e728cd351c54e5726397278d98ea332d83612e508cbcd5cfe4ad0940cf5e803c41264d2fd0a219f98f079227abb69b4e0e868aee00e9c1cd364f2b510eaaa53b38dc68639c239decfc36d4ff7869b32c043414d07af7ae8b7e98d6ef", 0x28, 0x62}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:41:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:41:56 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7, 0x9, &(0x7f0000001700)=[{&(0x7f0000000280)="b1cabd8921c6b8873e321a5ceb054f56997f3234b97bddbd69fc0e9e933641647275b6a3da4896aed450702136bb692f9faf03c577b24763524329a873ff75f05261053181710173f21663ff45846bbda85bff284b016c27441b4446fa5a657ee906edb49ef7e5d11cf7599ead24c152319787488d3bee52381a9ceb822a9532b2a1c50446", 0x85, 0x3}, {&(0x7f00000001c0)="e9cdb21d57e4e4b4265911b60daf941d2efb29e0e9620b473daca4ac1d8ed705f5e904273515ae992e5f1b03ff22ba03c6cdec23064c77ab01370a20777f0fda8ad74d7e88d8cf20d9216430c65a0c4aeac50e7710b1a67dcb3177e3e9218942578bb0ce00dc57e7b161847e26001ba146d6108fd099d27613ec08a52b90", 0x7e, 0x3f}, {&(0x7f0000000340)="a67cbf298a437b331f4c44b134a9b1e8221827794538646451c3687fbd14aaeca738853a68e7009697410356162dd7b5fbbf1b71762800fd0ec9d13b05d69c24082ccd8543e47d14290769f46edfb3036366671a4b2a81d1442c58e55b8eaa27d142e3ec29d0948dff6b", 0x6a, 0x8}, {&(0x7f00000003c0)="a9fbc6a1d995e48f19b0fccb104e1b6884d4cce17a5ac9d15069", 0x1a, 0x800}, {&(0x7f0000000400)="af269dfe92befe475680950fc939ec90a9c495a37b15bb750e68d5595c8fb735d5a2d581a6f4c2a6f76215854911d51d8b26f5b94572dc9891641702fc0fb47b149068836c5b2f6b9e6bc13910af258ee8746998617215b267446a5dbd33f8f582ab806f12896b7694ea1a7c750447f217c3cfa9c7b59afc1c6e308d1ffe77ff4dc85433adc6c01b360e5a45b426369263e4759039b5ceeb5bb68f9cae26f89a2bc1de54cfcefd6dc18531a45a9d38230511adeff2c7aa57ecd0932645cfe554c476fed9ff2f56bf8ded11e8bcdf43258448391f657b6ebc57d1454e011ad892c07a41b6c4bad5fc8e2681e833ccf15f18e5023d578e8f", 0xf7, 0xfe6}, {&(0x7f0000000500)="f8de590f56bc262d09a066b664fe9e3bcb6be3f8ed237d315d6d49aec01ebeaca11e34519fd70da6a6f01de7977d0a6eef3fc004d189f55898281accb63ce938c90f74a31224faf07648cc2855206a88c32486b26884105500760977bd53d1ab774c6e8d4a773ce77cf2038b1d4efcf4a4668435e0768f7ce162c67eac0f686a97d2a9349f031984f53e50664063a8c6a8d59f1d73d4382be8b4d810e59d1a7c856db8e8c5669ceb370e764e10aa77c02cdc7f9ba5de8d3d5b57a8b746a5de", 0xbf, 0x9}, {&(0x7f00000005c0)="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", 0x1000, 0x7fffffff}, {&(0x7f00000015c0)="65f2a3cb7234cdb152f02179a67ad1b1aef63cd4b44ac4001307cb24ffab41d4ca2e2cb3e8bef9f62fa3c7b1310c87f80ea4d270c052c5afd4419f39fd378b342de7b42de50e49df5220c4b51570d942acf42c8d64f50f5aa571786ec8641aed7a17d8", 0x63, 0x8}, {&(0x7f0000001640)="0c7912236ac0592734b296e661c6884a1203a9b36c4fb1e3308cdc853d694d3fc43b9366fd6e5a47a5ea33c15f03114c17fbca37b42b9d02fa2a82a79f60cc5b3473abd4fb15ff0a576189c3e9f28025f633654c64e119cf480d8e2607a565f9a97d6e5c408c60d2d926ab41065c1939ae7eb0d64441adfa86fb179c911cc093fd6b4fd9f4559a4f230a7ef93853e44b0ed437df0e52d085f2799eb18a1afef791ff232f6fb65219a609fcf30ca16e70c9b64d75a3bae0ec6b71", 0xba, 0xfffffffffffff84b}], 0x10002, &(0x7f0000001800)={[{@pqnoenforce='pqnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@usrquota='usrquota'}, {@attr2='attr2'}], [{@dont_appraise='dont_appraise'}]}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r4, 0x68, 0x10}, 0xc) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000001840)={r4, @in6={{0xa, 0x4e22, 0xfffffffffffffffa, @local, 0x3}}}, &(0x7f0000001900)=0x84) sendfile(r2, r1, 0x0, 0x2007ff) 00:41:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000080)={0x7b, 0x0, [0x1, 0x4, 0x778, 0x8000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:41:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:41:57 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$inet6(0xa, 0xa, 0xb7a0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="77000000d4d450cfa2b2a023ff9384529b83aee387c990f082091a86b60e51ac946215ca179245eb6e56cb4a72beee4d522b834d6d0ba08d8c1855c75b4de68673c57aca53f08409a38aa7b70f51c13ec25e2c6a166b6752c8fb6ea9c4950f7eac6cfdc1b0c06e09b315d4bb7bb1861389ea225005ab9bee1ad35e86de61fc0abbfd822eae405164ec7a30e54a30ccd993552149618293763f4dd4a2a0a5920ab145d0b288c9e0be24850e1cb191f701d1ac02bc05fd87c1ea0352b34908b1f4882533bebd7ee7ff2ae05c7fca1b5cc7303b91a91eb2bd6b13941878fac6654fed0ec733d43f23ffb68ee498f88a1d78e71904d4b4"], &(0x7f00000000c0)=0x7f) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in={{0x2, 0x4e22, @broadcast}}, [0x9, 0x8001, 0x5, 0x9, 0xfffffffffffffff8, 0x8, 0x0, 0x8, 0x2, 0x7, 0x7, 0x6, 0xfffffffffffffffd, 0x9, 0x1ff]}, &(0x7f00000001c0)=0x100) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r4, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) sendfile(r2, r3, 0x0, 0x2007ff) 00:41:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup3(r2, r2, 0x80000) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:41:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:57 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xb000000000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:41:57 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000340)={@dev, @empty, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast1, 0x4e22, 0x3, 0x4e20, 0x7, 0x2, 0x20, 0x0, 0xc, r3, r4}, {0x523, 0x1, 0x66a, 0x5d, 0x4, 0x3, 0x100, 0x10001}, {0x1, 0x10000, 0xb0, 0x5}, 0x0, 0x6e6bbb, 0x1, 0x0, 0x2, 0x3}, {{@in6=@ipv4={[], [], @multicast2}, 0x4d2, 0xff}, 0x2, @in6=@mcast1, 0x3503, 0x3, 0x0, 0x5, 0x6, 0x4}}, 0xe8) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000140)={0x40, 0x3, 0x0, [{0x9, 0x1, 0x6, 0x33f, 0x6, 0x6, 0x9}, {0x8001, 0x0, 0x1, 0x2, 0x3, 0x40, 0x47a}, {0x5, 0x2, 0x5, 0x100, 0x9, 0x6, 0x9}]}) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) sendfile(r2, r1, 0x0, 0x2007ff) 00:41:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:41:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f00000000c0)=""/35) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000024, 0x1001, 0x0, 0x6]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:41:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = semget$private(0x0, 0x3, 0x222) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000080)=""/28) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f00000000c0)={0x0, 0x100000000}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) prctl$PR_SET_UNALIGN(0x6, 0xfffffffffffffffe) 00:41:58 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x400, 0x20400) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f00000000c0)={0x7b, 0x0, [0x800, 0x0, 0x5, 0x10000]}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0x3]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:41:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:41:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) write$UHID_SET_REPORT_REPLY(r3, &(0x7f00000000c0)={0xe, 0x8, 0x7f, 0xf8, 0xd6, "525fb97825c0cf84b6861fe86293281cd28e4c8726ad1c4934e79fbe133d4c0639a96eef64f83b8fbe65f5ed5f1a5bb96b4ab39902fe90145298afcd2c4d7bae7b6e49354cfd8c5d73db0d00930fedf52bee1f789e785a104c0a95e0f48fc2895290e055bd23bb33d9c18be11d8b5f59a698edf5593f678d0a58097abf4c1628b646243f4e19cc336bd94112589c96512bbed49fc79cd64e2135d6c909370e558c40e306b4758448f2cde12dd641e49eab193745f80e31dbd6929a81567ab368ca53cf7785b4808ea52c93a916c2b1e99eea937c7c43"}, 0xe2) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:41:58 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xc805, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:41:58 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400040, 0x21) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x2c}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) capset(&(0x7f0000000240)={0x20071026}, &(0x7f00000000c0)={0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x0, 0x1}) sendfile(r0, r2, 0x0, 0x2007ff) 00:41:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:41:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x10005, 0x20000, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:41:58 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) msgget$private(0x0, 0x202) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) futimesat(r2, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)={{r4, r5/1000+30000}, {r6, r7/1000+10000}}) sendfile(r0, r1, 0x0, 0x2007ff) 00:41:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(0x0, 0x1) 00:41:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:41:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:41:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) setsockopt$inet_mreqsrc(r2, 0x0, 0x26, &(0x7f0000000000)={@broadcast, @rand_addr=0x6, @local}, 0xc) sendfile(r0, r1, 0x0, 0x2007ff) 00:41:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:41:59 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x2000000000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:41:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x111400, 0x0) connect$pptp(r1, &(0x7f00000000c0)={0x18, 0x2, {0x2, @multicast1}}, 0x1e) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000004c0)={'filter\x00'}, &(0x7f0000000540)=0x44) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r4 = geteuid() ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000480)) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000340)) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000400)={0x18a2, 0x5, 0x4, 0x40040012, {}, {0x3, 0x9, 0x7f, 0x1c6f, 0x4, 0xff, "6a26a084"}, 0x5, 0x0, @planes=&(0x7f00000003c0)={0x0, 0xb377, @userptr=0x9, 0x8000}, 0x4}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r1, &(0x7f0000000280)={0x90, 0x0, 0x6, {0x0, 0x3, 0x101, 0x4a, 0x1, 0x10000, {0x1, 0x4, 0x7f, 0x0, 0x9, 0x3ff, 0x8, 0x9, 0x9, 0x10001, 0x7f, r4, r5, 0x3fffc000, 0xcd}}}, 0x90) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'lo\x00', 0x600}) ioctl$KVM_RUN(r3, 0xae80, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000200)=0xf7dd, 0x4) 00:41:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(0x0, 0x1) 00:41:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:41:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1ff, 0x200) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f00000000c0)=0x2, 0x4) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(0x0, 0x1) 00:42:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040)=0xf5c2, 0xfffffffffffffdbc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000140)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) sendfile(r0, r2, 0x0, 0x2007ff) 00:42:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000100)={0x613, 0x9}) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40001, 0x0) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f00000000c0)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:42:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(0x0, 0x1) 00:42:00 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x6000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:42:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(0x0, 0x1) 00:42:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x400, 0x0) bind$pptp(r3, &(0x7f0000000200), 0x1e) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x4e22, @rand_addr=0x9}}, 0x4, 0x8, 0x379a, "26a32ecbdb9c90d4969204c7ef5eea0d93fb77b510e82a529489aec5d61408aadb51a84884d89641ca43d5a28adbbfa42bc82ea3c5e4b8cdff66877285c784d99d886687d5efd852b116cd940323ca05"}, 0xd8) 00:42:01 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x9000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:01 executing program 2: openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x200, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x5000, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) setuid(r4) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000180)={0x1, 0x0, [0x40000021, 0x1005, 0x0, 0x6]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:42:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:42:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0xfffffffffffffffd, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x4000, 0x0) ioctl$BINDER_SET_MAX_THREADS(r3, 0x40046205, 0x8000) 00:42:02 executing program 2: openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x80000, 0x5000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000080)=0x4f) 00:42:02 executing program 2: openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:42:02 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x500, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:02 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:03 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200000000000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:42:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x40003) setsockopt$bt_hci_HCI_DATA_DIR(r3, 0x0, 0x1, &(0x7f0000000040)=0x8, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:03 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:03 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xff000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000040)={0x3, r3}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [0x6, 0x1001, 0x0, 0x35]}) r4 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x3, 0x12200) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000140)={0x3, 0x3f, 0x1, 0x6, 0x80000001, 0x3cb0e092, 0x4, 0x5, 0x2, 0x80000001}) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x9, 0x7, 0x0, 0x9, 0x6, 0x1d, "82659bac28134f4bcbb9a1962d87a6fd07bdafcf1457e21b7c8c18cafb2b5a31bfea6b531859c63b39911b2a073bf5ed98474f4829b45558816d6ee9aaf455b1", "a8172b9bb58929c37488b1284e39356046d8b8527c824454bc67a95c755eba24250387a68f8e794dcf4970b57d00aa7c0c0c89df1ffdc16e959ed97748473c4d", "58bc461f581ecc928b9dc7edcec9fc7336a390187df7820494ecf89a1a948b89", [0x5, 0x6]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:42:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000600)='/dev/cec#\x00', 0x3, 0x2) sendmsg$kcm(r3, &(0x7f0000002c80)={&(0x7f0000000640)=@nfc_llcp={0x27, 0x0, 0x0, 0x7, 0x48, 0x7, "f2849a6c1448287f0fe042f6dc3451bc6bba2d632eefbca8b8fc6d77388445af0392e7858f68b9e770f333ee4f88e3fac20a016360d38a51b072c73c007f31", 0x1c}, 0x80, &(0x7f00000019c0)=[{&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000016c0)="3e89199a4fd160e62eef2e", 0xb}, {&(0x7f0000001700)="e12bdcca572ee9f3aafa4b2851d07d3e50e22dd9007d16c7cfa36e59cc1a4ecb8bdad11d0f531a9ee0b21941fa7f432f04d7515f982cc311382af4a02daab553acd9fc7c4777e61d355655f43666a9742062f9d1565015f10749cedb527d061e68da02c6ceb9cdb3e6c613ba830101053b8d98ae07bbb8831b22efb9c32ed6bb670188cd4ae895d553a0ebf0e5c7b5cad38c9f9b1f94c5a56ee0ae266c89847be37729e875813ae0299d15b475146ce1d47c9b56", 0xb4}, {&(0x7f00000017c0)="7589559da614d5542bfdbfba4b47c43318353d34e25a7d1612197adea8e792485bf0e844e3411a5be7e945c4dc68ba933fbef15943831333d0bdb27ad056fec08b5d48233298bd39f98c4e03771cbb83a6b158d59de7c21b65cc41788051a54b7b8102b909fe7364b9a27f4555bb65b3954fd64e52346c8d91e0", 0x7a}, {&(0x7f0000001840)="319b8abb600a8821393d909ef95f54e1091338595663d8c80ac4c59f840ea1764a9f8dcb4abcbf1e5ed0f5cb9a76c5363d8fd2a18b8f1db439ac46cc9b8e73f8bb", 0x41}, {&(0x7f00000018c0)="ff2fd928b1cb67168719eadfe48baf43a44f9c17daadd273f1d03749a82d80884678527ece7ddd9ddae6391077ec20af5c2e9f2e6bc6029cd0f795479c1f84176f1684c55a3986a3e6f82831cdc33be53cecbb755aed82592f7d22468fd47237403684e50cce33b45234c78677fa1a42dfa6c460f2ffe9c4a9b3c34ed2c2e7bf321cf8843f60b77d95f5b885099d88b6b5decb3f86bbaa84361953f2990780aa082e202a527a260785372a684a3d85e0cb6f2ba22abf6548f53d34c6a6376e38867ead9213e34280a09635d5445c464a461ab8d3c8dd5437a938e96d7c59e4983f855306f34a79a7cb60d8f8a4339337c695e4", 0xf3}], 0x6, &(0x7f0000001a40)=[{0x1010, 0x1, 0x2, "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"}, {0x60, 0x115, 0x45, "71753320e82eb1524f1be87d4c3094247a5ea7e1e81ebec1ec80a0fca7384d474f3e598e7f8a04ee219d5ca85c13e03504e94974558464775261774fc8a73621d5b0374c0c9719e6be"}, {0xd8, 0x10c, 0x1f, "b338ed71e6834f086e8556caf8fef16c3016083f70deb4dfb33d5c37d6a3ce597b7a2d44cc9d27556396449962291087e334f35f6da7ff8db413843c0efb6762ef705fb25552cd39ce9150e13af92fbab3a203d9830ac79499fc0b00f7fccefc2bedd08a9f062ad18e7fb98de938f2dd9f165a210de9f8182279edccde3a06efc16a5baca6c4d36bebdd8b1381da5f48823ad797e504cf5bb8f023ccfca801c835fc92fd2e438168065b4456e432dbe0bcddfc88d5ec117dd80fe5c2e73c4022e60ec33e82"}, {0x60, 0x3a, 0x3ab5, "6ddaf13bc20e53064cde4aa0dc575cae64091678ba5c0318caac00d9699874faf72d3f50b3b052ad13e031b3882c7eb07316627e32796038cccac9558862b82236936e7da67049f12c145692d3f6"}, {0x60, 0x113, 0x9, "dc9f1d032ea926745150987b6ecb6fa31615e76a24942e302541ecc2b3ce42057597ceb2ee4395b7664d80ba9fed0ba45c1fbf1ce420544715195cfbc1a565a50c0b87ec4c707e88128492cf"}, {0x10}], 0x1218, 0x10}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000027, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:42:04 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x78, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x7, 0x3ff}) 00:42:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) 00:42:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendto$unix(r3, &(0x7f00000000c0)="427090899846eaeb2c9dbbcfcb15747c0da8f9dd80f91bb9f0718116e565", 0x1e, 0x20000000, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e21}, 0x6e) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) shmget(0x2, 0x3000, 0x1, &(0x7f0000ffc000/0x3000)=nil) connect$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) getsockname(r3, &(0x7f0000000400)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000480)=0x80) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f00000004c0)={r4, 0x0, 0x8001, 0x2, 0x5fa5987d}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x27, 0x1, 0x2, 0x40000, 0x88eb, 0x5, 0x7, {0x0, @in6={{0xa, 0x4e23, 0x0, @ipv4, 0x7}}, 0xddd7, 0xd4, 0x40, 0x0, 0x6}}, &(0x7f0000000280)=0xb0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYRES32=r5, @ANYBLOB="0300c79ec355afabe832e0000800650a00000000000000000000"], 0xe) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:42:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x100, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) accept4$llc(r3, 0x0, &(0x7f0000000100), 0x800) setsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000000c0)={0x7fff, 0x7, 0x8}, 0x6) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) 00:42:05 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xe803000000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) r3 = dup(r1) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000080)={0x1, r3, 0x1}) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x615, 0x8000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:42:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x4000001e, 0x1001, 0xffffffffffffffff, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) 00:42:06 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x9c, 0x111000) write$P9_RFLUSH(r2, &(0x7f00000000c0)={0x7, 0x6d, 0x2}, 0x7) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 00:42:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'security.', '\x00'}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) 00:42:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:06 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xb0, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/relabel\x00', 0x2, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000100)={0x2, 0x7, [{0x7fff, 0x0, 0xfffffffffffffff7}, {0x400, 0x0, 0x3}]}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x7704, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) 00:42:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) 00:42:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:07 executing program 0: r0 = semget(0x2, 0x3, 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0xff) semctl$SEM_INFO(r0, 0x2, 0x13, &(0x7f0000000280)=""/4096) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000100)=0xb) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:42:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:07 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xf5ffffff, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:42:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0xf5c1731df8745992) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000000c0)={@local, 0xb391d96, 0x1, 0x3, 0x3, 0x1a, 0x2, 0x4}, 0x20) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) 00:42:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000080)={0x400000001, 0x0, [0x40000021, 0xfff, 0xffffffefffffff98, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000280)={"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"}) 00:42:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x7b, 0x0, [0x40000021, 0x10000000001001, 0x2, 0xffffffffffffffff]}) r3 = getuid() ioprio_get$uid(0x3, r3) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9539900000f01c1660fae3fc4e259972866baf80cb8605a1f8aef66bafc0c66b8680066ef855b00b805000000b9000000000f01c18fc98093c90f350f01cf64fa", 0x46}], 0x1, 0x4, &(0x7f0000000180), 0x0) pwritev(r2, &(0x7f0000000480)=[{&(0x7f00000001c0)="7a7f52ed8ebd09cc9928beeeeefca9ba1a663ab4ab91169e0f51052cffedfbcb5d449c68ead8e2331c61dabdadfc", 0x2e}, {&(0x7f0000000280)="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", 0xff}, {&(0x7f0000000380)="0ee15dfd62f7543733cdef53f3e0b08535f3b3883c81f9efe90393ae5c0d245ed15b233041f0b3a186a4520473967d085eacf2aeb7f49dcb61fe82f91a3b1ed4e3ba4cc4653652bf454b362671fb34123640386bff54575cfc766a28da97a2ee3cf7c52de4dd2c5329606657beaece7bd514d3ed330729c3568b291f7c2010c83a85c0711e2eb3642f8142d51162d341b8aabe947f7c54e9a5860664a9c683572d561cd6369977e6369587a147fedce0c75ec393862b501a0e72ef9bafd3e6837b3662bebc1664634768", 0xca}, {&(0x7f0000000200)="aaae00a16413", 0x6}], 0x4, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) poll(&(0x7f0000000080)=[{r1, 0x80}, {r4, 0x220}, {r0, 0x1000}], 0x3, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) 00:42:08 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x100000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) 00:42:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) clock_gettime(0x0, &(0x7f0000004200)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000004300)=[{{&(0x7f0000000100)=@sco, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)=""/194, 0xc2}, {&(0x7f0000000180)=""/181, 0xb5}], 0x2, &(0x7f00000003c0)=""/96, 0x60, 0xa43d}, 0x7}, {{&(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f00000004c0)=""/132, 0x84}, {&(0x7f0000000580)=""/137, 0x89}, {&(0x7f0000000640)=""/41, 0x29}, {&(0x7f0000000680)=""/17, 0x11}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/105, 0x69}, {&(0x7f00000007c0)=""/143, 0x8f}], 0x7, &(0x7f0000000900)=""/30, 0x1e, 0x9}, 0x1}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000940)=""/249, 0xf9}, {&(0x7f0000000a40)=""/95, 0x5f}, {&(0x7f0000000ac0)=""/190, 0xbe}], 0x3, &(0x7f0000000bc0)=""/225, 0xe1, 0x2}, 0x4c}, {{&(0x7f0000000cc0)=@ll, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000d40)=""/238, 0xee}, {&(0x7f0000000e40)=""/250, 0xfa}], 0x2, &(0x7f0000000f80)=""/206, 0xce}, 0x1}, {{&(0x7f0000001080)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)=""/72, 0x48}], 0x1, &(0x7f00000011c0)=""/4096, 0x1000, 0x6}, 0x7}, {{&(0x7f00000021c0)=@can, 0x80, &(0x7f00000035c0)=[{&(0x7f0000002240)=""/186, 0xba}, {&(0x7f0000002300)=""/204, 0xcc}, {&(0x7f0000002400)=""/151, 0x97}, {&(0x7f00000024c0)=""/120, 0x78}, {&(0x7f0000002540)=""/123, 0x7b}, {&(0x7f00000025c0)=""/4096, 0x1000}], 0x6, &(0x7f0000003640)=""/198, 0xc6, 0x4}}, {{&(0x7f0000003740)=@xdp, 0x80, &(0x7f0000003ac0)=[{&(0x7f00000037c0)=""/245, 0xf5}, {&(0x7f00000038c0)=""/181, 0xb5}, {&(0x7f0000003980)=""/89, 0x59}, {&(0x7f0000003a00)=""/153, 0x99}], 0x4, &(0x7f0000003b00)=""/244, 0xf4, 0x6}, 0x1}, {{&(0x7f0000003c00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000003d80)=[{&(0x7f0000003c80)=""/192, 0xc0}, {&(0x7f0000003d40)=""/54, 0x36}], 0x2, &(0x7f0000003dc0)=""/204, 0xcc, 0x4}, 0x5}, {{&(0x7f0000003ec0)=@l2, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003f40)=""/19, 0x13}, {&(0x7f0000003f80)=""/74, 0x4a}, {&(0x7f0000004000)=""/140, 0x8c}], 0x3, &(0x7f0000004100)=""/246, 0xf6, 0x21}, 0x8001}], 0x9, 0x10001, &(0x7f0000004240)={r3, r4+30000000}) getsockopt$packet_buf(r5, 0x107, 0x0, &(0x7f0000004280)=""/50, &(0x7f0000004540)=0x32) r6 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r6, 0x112, 0xd, &(0x7f00000000c0)=0x8, 0x2) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000004640), &(0x7f0000004680)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x8, &(0x7f0000004580)=0x4, 0x4) r7 = inotify_add_watch(r2, &(0x7f00000045c0)='./file0\x00', 0x204) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000004600)='/dev/dlm-control\x00', 0x4200, 0x0) inotify_rm_watch(r6, r7) syz_open_dev$mouse(&(0x7f00000046c0)='/dev/input/mouse#\x00', 0x401, 0x40) ioctl$KVM_RUN(r8, 0xae80, 0x0) 00:42:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:42:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sched_yield() ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) 00:42:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:09 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xfc000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:42:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x10202, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x3, 0x80100) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0x8, 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [0xff, 0x1001, 0x0, 0x7]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r4, 0xc004aea7, &(0x7f0000000040)=0x3f) 00:42:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = dup(r2) getpeername$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) connect$can_bcm(r3, &(0x7f0000000100)={0x1d, r4}, 0x10) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U+', 0xea}, 0x28, 0x3) 00:42:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:10 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x7800, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:10 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r2, 0xc0186419, &(0x7f0000000300)={0x3, &(0x7f00000000c0)=""/6, &(0x7f0000000280)=[{0x7fff, 0xb, 0x6, &(0x7f0000000100)=""/11}, {0xfffffffffffff1cf, 0x99, 0x47b, &(0x7f0000000140)=""/153}, {0xc744, 0x1a, 0x4, &(0x7f0000000200)=""/26}]}) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000380)=0x0) r4 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) sendmsg$nl_netfilter(r2, &(0x7f0000001840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001800)={&(0x7f0000000440)={0x13a8, 0xd, 0x5, 0x400, 0x70bd25, 0x25dfdbff, {0x0, 0x0, 0x7}, [@nested={0x1f0, 0x30, [@generic="7ad325bb445995aa0662661d8282b145a71ce65aa69a0e4a899d5d1e5029d6e914cde90abe52bc7ce770f0d1a16de13c243728095f2ade40ed0a211dc9b4d376674421a1b084441f0035e42545fa3046da1db03c10818206d106c52ee26bfd338896a91c7edf3c1e0264276ff673ad46d8bce0ef4bfa2ae7c9f91ee60a00cf1dc3ca88379818", @typed={0x14, 0x91, @ipv6}, @typed={0x8, 0x54, @u32=0x1000}, @generic="97b801de3c3950017a652e62f353bc7c97cc249178cf1be696d1daba22f333e43629d6a865cab97f8e4e93c45f07739cd092dd8d5a886509bb734efc433ac6e02a2f1fa94362f432ebae5c2af8e0962fef4fa7c26990cee38f52606430285cb69f2638bff3244bc1e76b4e635f0ff6ed54a92f43ce858c4370bba0f6f49e0e120976fc44cf3004a2c1b230165d9bd53b752bd09079d4c22a5fb8c2", @generic="c5f616300d2f780167b2e369997c55a7acdd98d4e733", @typed={0x8, 0x4b, @u32=0x1}, @typed={0x8, 0x4e, @str='\x00'}, @generic="7e48185b0fa933a85d31221073778f370c12a8d72355573836c6188ada25d1e3e6c1644e3503d9569c47197ab018e2c36185db58b10e1ab51a858aa6bbf2d42f7a6791a506c9814deb030f50f8be1c86516edea757dc01be76f0dc6d332b01c13e5c238a3e47224d3d54435fdfd97744fe5658059f098d54c7a992df1c7a7c136b7f2adbe4f920"]}, @generic="f628fb4110a788", @nested={0x94, 0x82, [@typed={0x8, 0x25, @u32=0xfd17}, @typed={0x8, 0x1f, @u32=0x29}, @generic="7c19d8ea94d1b32ff8815fe271e542f305ec4b9a75e34a1df95dc3003f2a6173c2eea644b9d27d4369e36ca111eb067343da499a56025c58b37c663fc1ac8f7210f9f19fe165e69e", @typed={0x8, 0x8c, @u32=0x1ff}, @typed={0x14, 0x64, @ipv6=@remote}, @typed={0xc, 0x71, @u64=0x2}, @typed={0x8, 0x2, @pid=r3}, @typed={0x8, 0x9, @uid=r4}]}, @generic="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", @generic="2906d413db268e3d5ff021c441c1600df9601d0a2a3b4e2013ddef2137866e64928488547d4711015250fe90f1588397a845e74f9726d90bf097cbba049ec8011ef1ae53e1f5288d31109ddf5655ec9cbe81dcb520e72206f3ce03e9310da86f658ea40cf1db755803880673f18dc3191a78dffd43c13c170e8e311f296e81b102405c4ce92e5b5c4af663b74e40cec1a8d0a5d72e0cfaf843b594988bf4b190e031529093886f59286421627a5efadea062adef2e43ec05a08b597bd75139ea34e2cd71264928c46aa042fdd0", @typed={0x8, 0x6c, @pid=r5}, @generic="a4fa97b0be836fde9ee1b4dab10dcc7844fda7f1abbedae708a84497b9f21d3e20664f0395dc51cfb35b95d2d1c740bf9e415251"]}, 0x13a8}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) 00:42:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x7f, 0x440000) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f00000000c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:11 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:11 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xa00000000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:11 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xf, 0x51a7, 0x8, 0x75efcc5b, 0x39, 0xffffffffffffff9c, 0x1789}, 0x2c) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x10205, 0x3, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000000c0)) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x80d00) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) 00:42:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, 0x0, &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:42:12 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x200, 0x0, 0xffffffffffffffff]}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x100, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f00000000c0)={0x6, 0x3, 0x100000000, 0x6}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f00000000c0)={0x80, 0x6}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:42:12 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x300000000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, 0x0, &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x1) 00:42:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0xffffffffffffffff, 0xffffffffffffffff]}) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f00000000c0)={0x6, 0xfffffffffffffe00, 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:13 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000480)=ANY=[@ANYBLOB="05000000000000000500000004000000000000000000000007000000000000009e780000000000000900000000000000880000000000000004000000010000000000000000000000e58c176a88ffffffff00000000060000000000000069d6d927000000000500000002000000faffffff391f1c200000000000000000050000000100000006000000000000000000000000000000000000000000000003000000030000000000000000000000839e000000000000000000000000000000feffffffffffff0400000003000000c4f000000600000000000000000000000000000000000000020000000000000004000000000000000900000009000000"]) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x4740, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000400)) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x10004, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x1ff}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000280)={r4, 0x5, 0x1}, &(0x7f00000002c0)=0x8) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000300)=""/248) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000440)) 00:42:13 executing program 3 (fault-call:4 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:13 executing program 1: r0 = msgget$private(0x0, 0x20) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/12) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000006a80)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x198) setsockopt$packet_int(r1, 0x107, 0xc, &(0x7f0000000080), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_SECCOMP(0x15) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:42:13 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x8000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x400, 0x400000) r4 = getpgid(0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f00000000c0)={[], 0x40, 0x1, 0x74d9, 0x800, 0x9, r4}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:13 executing program 3 (fault-call:4 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000100)) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x5c) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f00000000c0)) 00:42:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:14 executing program 3 (fault-call:4 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@dev, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000900)={@dev={0xfe, 0x80, [], 0x10}, 0x14, r2}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'erspan0\x00', 0x1}, 0x18) 00:42:15 executing program 3 (fault-call:4 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) pause() ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:15 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xc805000000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:15 executing program 3 (fault-call:4 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:15 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x18000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000100)={0x1, 0x724, 0xffffffffffff0001, 0x0, 0x0, [], [], [], 0x2}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fchown(r1, r2, r3) listen(r1, 0x0) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0xbf3) 00:42:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:15 executing program 3 (fault-call:4 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:15 executing program 3 (fault-call:4 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:16 executing program 3 (fault-call:4 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x5, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) capset(&(0x7f0000000040)={0x399f1736, r3}, &(0x7f0000000080)={0x3, 0x80000001, 0x7, 0x2, 0x5, 0x5}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = socket(0x5, 0xb, 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x1f}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000140)={r5, 0xaf81}, 0x8) 00:42:16 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x60000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x80000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='/dev/kvm\x00') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) write$P9_RFLUSH(r3, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7) 00:42:16 executing program 3 (fault-call:4 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x7b, 0x0, [0x40000021, 0x1003, 0x0, 0xffffffffffffffff]}) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x5, 0x2) ioctl$BLKRESETZONE(r3, 0x40101283, &(0x7f00000000c0)={0x100000000, 0x9}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:17 executing program 3 (fault-call:4 fault-nth:9): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:17 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x8000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:17 executing program 0: syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:17 executing program 3 (fault-call:4 fault-nth:10): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x1, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x4, 0x3, [0x10000, 0x1ff, 0xe6]}, &(0x7f00000000c0)=0xe) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000100)={r3, 0x10000}, 0x8) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x101000, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x2400, 0x0) ioctl$TIOCEXCL(r5, 0x540c) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000180)=@generic={0x1, 0x1}) 00:42:18 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xa000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:18 executing program 3 (fault-call:4 fault-nth:11): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [{0xc0010bff, 0x0, 0x4}]}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$EVIOCGEFFECTS(r2, 0x80044584, &(0x7f0000000080)=""/21) 00:42:18 executing program 3 (fault-call:4 fault-nth:12): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:18 executing program 1: mlockall(0x7) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x3, 0x8972, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mlock2(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x0) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000a90000/0x4000)=nil) r1 = socket(0x2, 0x5, 0x8000000000000000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r2) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000b1d000)={&(0x7f0000a93000/0x3000)=nil, 0x20000002, 0x0, 0x0, &(0x7f0000b1c000/0x4000)=nil}) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3, &(0x7f0000000240)=[{&(0x7f00000000c0)="1170a1ce8035df9e0d7c7250abc2a076663cc28f9f1fcbac7a9f5ebf35d55c54af43", 0x22, 0x3}, {&(0x7f0000000100)="cb062308791555ba7644cb0e710322f98129727a2f83419d53e1058ee9b4cf5d831fb65a84814dfa2ddeb4aaebc357043c6117ea4d3f8c3e50aaae476bd0f9ce7e3d7c4fef0e41b1650f0b4bb193b3f295d95b09b1742ee3094b2c26ad2a43e7965aaf654fa91d0fe8d64becaa083a3aab59", 0x72, 0xfffffffffffffffc}, {&(0x7f0000000180)="597e756cd3c1920be6b09f44902a731b6621da9004f102ef", 0x18, 0x3}], 0x180e806, 0x0) mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x5) vmsplice(r0, &(0x7f0000b1d000)=[{&(0x7f0000005fe3)}], 0x1, 0x0) 00:42:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:18 executing program 3 (fault-call:4 fault-nth:13): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f00000000c0)=0x5) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000000340)=0x1) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000380)) r4 = fcntl$getown(r1, 0x9) get_robust_list(r4, &(0x7f00000001c0)=&(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)}}, &(0x7f0000000200)=0x18) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000300)) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000280)={0x5, 0x7, 0x7fff, 0xce9b, 0x7, 0x6}) 00:42:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:19 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x1100, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:19 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = open$dir(&(0x7f0000000140)='./file1/file0\x00', 0x183200, 0x100) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x800, 0x0) renameat(r1, &(0x7f0000000240)='./file1\x00', r2, &(0x7f0000000300)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x5, 0x20000) utime(&(0x7f0000000040)='./file1\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) 00:42:19 executing program 3 (fault-call:4 fault-nth:14): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000280)={"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"}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x800, 0x0) ioctl$KDGETMODE(r3, 0x4b3b, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:19 executing program 1: r0 = dup(0xffffffffffffffff) sendto$unix(r0, &(0x7f0000000180)="568761e5090f505b8cbcb55aa0696472084a32d20b018d7f06066ee9d1c55cab578ed06cbc286dbdc66da0ddc1059d8180e82e78757ebbee16661eb5ef64ebe49f58d3f89e9bdb40ea98d030cf4e9d51403b52cc3c2c2c42ea9b9f090d01f7baae431fff5592fcaea6bad1099b14bbb3e7de1b4593f7ef3cc13829dc95195a6cf0811c9fbe218554eb095d26f44114ae98b83b1c82e925c1a56b420087fd0db0b33e90b2f14318e84d2420f3fd933c7b4a", 0xb1, 0x40000, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) r1 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0bc5351, &(0x7f00000000c0)={{}, 'port0\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) close(r2) dup(0xffffffffffffffff) r3 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r5, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r5, 0x0) connect(r4, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r4, r6, &(0x7f0000000000), 0x800000bf) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r7 = memfd_create(&(0x7f0000000e40)="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", 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000240)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r8, r9) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000004000000000000004000000000000000000000380000000000000000000000000000000000000000000000000000000000000000040000000000000000000000100000000000000000010000000000000000000000"], 0x6d) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x111, 0x1000}}, 0x20) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r10, 0x8200) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) 00:42:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:19 executing program 3 (fault-call:4 fault-nth:15): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x34, 0x800) getsockopt$inet6_tcp_buf(r3, 0x6, 0x0, &(0x7f00000000c0), &(0x7f0000000100)) 00:42:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:20 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xa, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:20 executing program 3 (fault-call:4 fault-nth:16): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = add_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="d11343eb2edccb2eeb640264708277d5986427af941086d799a6a55ec3e9de3b30fb31dc3d6793b14c61bbe154f663c06da4a624d6f2a5c19af3277be004fb06e0f41c248e49956af72f14b351471a30d0c480a22a782c5ebf29a2eda17b0edd5dabad1984ee2339596040dce33012e721178dad0075317e114e7aba4afb90a9c0f0dcaba596522d3caee865b286ca3059", 0x91, 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, r3, &(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)='\x00') 00:42:20 executing program 1: r0 = dup(0xffffffffffffffff) sendto$unix(r0, &(0x7f0000000180)="568761e5090f505b8cbcb55aa0696472084a32d20b018d7f06066ee9d1c55cab578ed06cbc286dbdc66da0ddc1059d8180e82e78757ebbee16661eb5ef64ebe49f58d3f89e9bdb40ea98d030cf4e9d51403b52cc3c2c2c42ea9b9f090d01f7baae431fff5592fcaea6bad1099b14bbb3e7de1b4593f7ef3cc13829dc95195a6cf0811c9fbe218554eb095d26f44114ae98b83b1c82e925c1a56b420087fd0db0b33e90b2f14318e84d2420f3fd933c7b4a", 0xb1, 0x40000, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) r1 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0bc5351, &(0x7f00000000c0)={{}, 'port0\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) close(r2) dup(0xffffffffffffffff) r3 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r5, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r5, 0x0) connect(r4, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r4, r6, &(0x7f0000000000), 0x800000bf) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r7 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e59073487cf36ad576e32926b04894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa22a505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd687928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c", 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000240)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r8, r9) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000004000000000000004000000000000000000000380000000000000000000000000000000000000000000000000000000000000000040000000000000000000000100000000000000000010000000000000000000000"], 0x6d) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x111, 0x1000}}, 0x20) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r10, 0x8200) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) 00:42:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:20 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000000c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000140)={{0x2, 0x4, 0x3, 0xffffffffffff34c7, 'syz0\x00', 0x100000001}, 0x5, 0x30, 0x8001, r1, 0x6, 0x1, 'syz1\x00', &(0x7f0000000100)=['\x00', '/dev/kvm\x00', ')@systemeth0$.\x00', '/dev/kvm\x00', '\x00', ':@md5sum&trustedvmnet1+\x00'], 0x3b, [], [0x3, 0x8, 0x7, 0x7]}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000280)={'\x00', {0x2, 0x4e23, @multicast2}}) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:42:20 executing program 3 (fault-call:4 fault-nth:17): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x22) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e21, 0x5, @mcast1, 0x4}}, 0x3, 0x400, 0x9, "65d054121a11fd79536b08dcef9acfbbf5f12800442e3edeb2678cc2d8e1638a96ffd790e36de6f5c482399475907107a4bdcc0b4871ccef05e3eb9ed7c9c98a8b1ffddaef97d9a8d7e8aaf311cc6969"}, 0xd8) r4 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x9, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r4, 0xc4c85513, &(0x7f0000000280)={{0x4, 0x7, 0x9, 0x7fffffff, 'syz0\x00', 0x80}, 0x0, [0x7, 0xfffffffffffffffe, 0x7, 0xffff, 0xf8, 0x2, 0x20, 0x8, 0x2, 0x5, 0x4, 0x80000001, 0x1b, 0x5, 0xfffffffffffff06c, 0x1, 0x81, 0x8001, 0x80000001, 0x40, 0x9, 0x40, 0x2, 0x22, 0x0, 0x800, 0xfffffffffffff801, 0x403, 0x7fffffff, 0x100000001, 0x6, 0x75, 0x7f, 0x9, 0x2, 0x1, 0x2, 0x90c, 0x8b40, 0xff, 0x7, 0x6, 0x7, 0x1, 0xfffffffffffffff7, 0x0, 0xfffffffffffff7db, 0x2, 0xffff, 0x4, 0x2, 0x9, 0xff, 0xd81, 0x101, 0x0, 0x9, 0x1, 0x8, 0x80000001, 0x7, 0x80, 0xf91, 0x5, 0x7, 0x7fffffff, 0x7, 0x9, 0x1, 0xe0, 0xffffffff, 0x100000001, 0x7fffffff, 0x1, 0x7f, 0x80, 0x3, 0x40, 0x9, 0x1, 0x3, 0x7fffffff, 0x7fff, 0x7, 0x80000001, 0xd8, 0x6, 0x3f, 0xdf, 0x3, 0x200, 0x6, 0x200, 0x8, 0x7, 0x5, 0x1f, 0x10000, 0x200, 0x6, 0xffffffffffffff00, 0x2, 0x40, 0x2f0bf8a2, 0x9, 0x80000000, 0x101, 0x2, 0x9, 0x20, 0x5, 0x80, 0xffffffffffffffc0, 0x0, 0x3ff, 0x8001, 0x5, 0x5, 0x2, 0x8001, 0x1fa8, 0x8, 0x6, 0x9, 0x1f, 0x5, 0x80000001, 0xffffffff], {0x77359400}}) 00:42:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f", 0x4d, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:21 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xd8, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:21 executing program 3 (fault-call:4 fault-nth:18): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x64200, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, r2, 0x200, 0x70bd28, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0x4}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004000}, 0x1) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r7, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r7, 0xae80, 0x0) 00:42:21 executing program 1: r0 = dup(0xffffffffffffffff) sendto$unix(r0, &(0x7f0000000180)="568761e5090f505b8cbcb55aa0696472084a32d20b018d7f06066ee9d1c55cab578ed06cbc286dbdc66da0ddc1059d8180e82e78757ebbee16661eb5ef64ebe49f58d3f89e9bdb40ea98d030cf4e9d51403b52cc3c2c2c42ea9b9f090d01f7baae431fff5592fcaea6bad1099b14bbb3e7de1b4593f7ef3cc13829dc95195a6cf0811c9fbe218554eb095d26f44114ae98b83b1c82e925c1a56b420087fd0db0b33e90b2f14318e84d2420f3fd933c7b4a", 0xb1, 0x40000, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) r1 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0bc5351, &(0x7f00000000c0)={{}, 'port0\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) close(r2) dup(0xffffffffffffffff) r3 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r5, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r5, 0x0) connect(r4, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r4, r6, &(0x7f0000000000), 0x800000bf) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r7 = memfd_create(&(0x7f0000000e40)="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", 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000240)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r8, r9) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000004000000000000004000000000000000000000380000000000000000000000000000000000000000000000000000000000000000040000000000000000000000100000000000000000010000000000000000000000"], 0x6d) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x111, 0x1000}}, 0x20) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r10, 0x8200) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) 00:42:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f", 0x4d, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:21 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x2, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000000c0)={0x0, @output={0x1000, 0x1, {0x8, 0xfffffffffffffffa}, 0x8, 0x7c0}}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) connect$pptp(r0, &(0x7f00000001c0)={0x18, 0x2, {0x3, @rand_addr=0x7ff}}, 0x1e) 00:42:21 executing program 3 (fault-call:4 fault-nth:19): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f", 0x4d, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f0000000080)={0x10f004, 0x106000, 0x4, 0x6, 0x8}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:22 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xfec0, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:22 executing program 1: r0 = dup(0xffffffffffffffff) sendto$unix(r0, &(0x7f0000000180)="568761e5090f505b8cbcb55aa0696472084a32d20b018d7f06066ee9d1c55cab578ed06cbc286dbdc66da0ddc1059d8180e82e78757ebbee16661eb5ef64ebe49f58d3f89e9bdb40ea98d030cf4e9d51403b52cc3c2c2c42ea9b9f090d01f7baae431fff5592fcaea6bad1099b14bbb3e7de1b4593f7ef3cc13829dc95195a6cf0811c9fbe218554eb095d26f44114ae98b83b1c82e925c1a56b420087fd0db0b33e90b2f14318e84d2420f3fd933c7b4a", 0xb1, 0x40000, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) r1 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0bc5351, &(0x7f00000000c0)={{}, 'port0\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) close(r2) dup(0xffffffffffffffff) r3 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r5, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r5, 0x0) connect(r4, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r4, r6, &(0x7f0000000000), 0x800000bf) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r7 = memfd_create(&(0x7f0000000e40)="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", 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000240)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r8, r9) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000004000000000000004000000000000000000000380000000000000000000000000000000000000000000000000000000000000000040000000000000000000000100000000000000000010000000000000000000000"], 0x6d) execveat(r7, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x111, 0x1000}}, 0x20) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r10, 0x8200) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) 00:42:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:22 executing program 3 (fault-call:4 fault-nth:20): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) r3 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x0, 0x80800) getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) ioctl$TUNSETOWNER(r3, 0x400454cc, r4) ioctl$KVM_RUN(r2, 0xae80, 0x0) r5 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r5, 0x4014563c, &(0x7f00000000c0)={0x0, {0x4, 0x8, 0x6, 0x10000}}) 00:42:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6", 0x53, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x400, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) 00:42:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:23 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:23 executing program 3 (fault-call:4 fault-nth:21): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6", 0x53, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f00000000c0)={'ifb0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)="2871ddcbdd481603bd84776d8bc9a2a1b437367813879de9718142fb85e6d0fcd8b02b5991500d431160baad2f989336f81a04d87d47c506adb6159541", 0x3d, 0xfffffffffffffffc) r4 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$search(0xa, r4, &(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x3}, r5) 00:42:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:24 executing program 3 (fault-call:4 fault-nth:22): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000280)) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) fsetxattr$security_smack_entry(r3, &(0x7f00000000c0)='security.SMACK64IPIN\x00', &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x19, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:42:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6", 0x53, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:24 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xfe800000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6", 0x53, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1, 0x200000) fchmodat(r3, &(0x7f00000000c0)='./file0\x00', 0x130) 00:42:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6", 0x53, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e", 0x56, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6", 0x53, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:24 executing program 3 (fault-call:4 fault-nth:23): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)=0x0) r4 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x1ff, 0x2, 0x2, 0xd307, 0x0, 0x400, 0x80, 0x8, 0x6, 0x10000, 0x8f5d, 0x7, 0x6, 0x2, 0x7, 0x100000000, 0x8, 0x39100000000, 0x6, 0x5, 0x8, 0x7f, 0x81, 0x101, 0x0, 0xffffffff, 0x0, 0x9, 0x6, 0x3, 0x45c9, 0x6, 0x7f, 0x0, 0x6, 0x57, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x100}, 0x10000, 0x3, 0x2, 0x5, 0x7, 0x401, 0xfffffffffffff801}, r3, 0x1, r4, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:25 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x103, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6", 0x53, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e", 0x56, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x2) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r3, 0x12, 0x2, &(0x7f00000000c0)=""/2, &(0x7f0000000100)=0x2) socket$inet(0x2, 0x7, 0x3) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [0x2, 0x1001, 0xc2, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6", 0x53, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:25 executing program 3 (fault-call:4 fault-nth:24): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6", 0x53, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e", 0x56, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:25 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x2) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x204, &(0x7f00000011c0)}}], 0x249, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r3) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000140)={0x0, 0x1, 0x5000, 0x1000, &(0x7f0000ffb000/0x1000)=nil}) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x50000, 0x0) ioctl$SG_SET_COMMAND_Q(r5, 0x2271, &(0x7f00000000c0)=0x1) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f00000002c0), 0x4) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r4, 0x8919, &(0x7f0000000280)={'bond0\x00', {0x2, 0x4e24, @local}}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x13, r3, 0x0) 00:42:25 executing program 1: r0 = socket$inet6(0xa, 0x4000000000803, 0x22) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f00000012c0)=""/186) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) syz_emit_ethernet(0x36, &(0x7f0000001140)=ANY=[@ANYBLOB="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"], 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x4040, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000140)=""/4096) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@local, 0x100, 0x0, 0x1, 0x3, 0x7, 0x22e, 0x3}, 0x20) 00:42:26 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x2c010000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:26 executing program 3 (fault-call:4 fault-nth:25): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e0713", 0x58, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x7f, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x3, 0xffffffffffffffff, 0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x20800a2, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)="2e2f4e67726f2f73797a31002d56835eba846769d185e93ee2889b1776a44ca5051ba2b99e2c63353edd8dd144e4abf9e330b33e9d3c259737f775bea042fc4eb8355f77196bd4a7d4bb58647f5e3bb3d0115a02fbb426128bed68a859afea0be507d54fb70c760265c33bc1ed29e412266fbc3734aa5a73e29a475d1aa818ba32fb9c3f5b0b3e6d49cf2cc2120c631ae000790c45ade5696ed15b1b373cffc85b566e36558dcee9b7361a7971c16bf53ab2762c057c48a0afa6ce1f20c2161b3f263e4ad34b5c16b53bfe0000000000000088", 0x1ff) io_destroy(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)="2e2f6367726f75702e6e65742f2f797a312775ca1e56b82a6b2c9602345bf0841f9c0210ea8317e1c2fd7ad819a4e039", 0x1ff) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000080)={0x20, 0x0, 0x7, {0x0, 0x6}}, 0x20) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000006c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000380)={0x0, 0x1, 0x3, 0x6, 'syz0\x00', 0x3}) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x9, 0x0, 0x11, 0xfffffffffffff722, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81bd, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x4, 0x0, 0x9, 0x8, 0x0, 0x100000000, 0x0, 0x0, 0xffffffffffffd5c2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffff8}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000134000)={0x2, 0x0, @broadcast}, 0x10) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x3f) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000200)={0x0, 0x1, 0x0, {}, 0x1, 0x100000000}) io_setup(0xb30, &(0x7f00000000c0)=0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000001c0), 0x4) io_pgetevents(r3, 0x1, 0x2, &(0x7f0000000040)=[{}, {}], &(0x7f0000000140)={0x0, 0x1c9c380}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000340)={'ah\x00'}, &(0x7f0000000440)=0x1e) r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7fff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c04, 0x0) socket$inet6(0xa, 0x2, 0x3) getsockopt$IP_VS_SO_GET_VERSION(r4, 0x0, 0x480, &(0x7f0000000100), &(0x7f0000000180)=0x19b) clone(0x802102081ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x10100, 0x0) 00:42:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0xffffffffffff8001, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:26 executing program 1: ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffff9c, 0x40505330, &(0x7f00000000c0)={{0x4, 0x9}, {0x7ff}, 0x33a6, 0x2, 0x5}) socketpair(0x5, 0xa, 0x4, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f00000002c0)=""/131) perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x2, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x6000000}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000200)={r3, 0xfff, 0x2, 0x6}, 0x10) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x800, 0x0) timerfd_create(0x3, 0x80800) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120009000e00010000000000060005001200", 0x2e}], 0x1}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x100000000000200, 0x0) 00:42:26 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000540)={0x0, 0x0, 0x0, &(0x7f0000000a00)=""/157, 0x0}) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0xfffffd6b, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000140)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000000)={0xfffffffffffffffe, 0x0, 0x0, &(0x7f0000000400)=""/156, 0x0}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000000c0)=0x1) 00:42:26 executing program 3 (fault-call:4 fault-nth:26): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80000, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x40800, 0x0) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2, 0x14, 0x5, 0xf, 0x1e, 0x0, 0x70bd2c, 0x25dfdbfe, [@sadb_sa={0x2, 0x1, 0x4d5, 0xff, 0xc0200000000, 0x5a, 0x3, 0x1}, @sadb_x_filter={0x5, 0x1a, @in6=@local, @in6=@remote, 0xb, 0x10, 0x4}, @sadb_x_sec_ctx={0x15, 0x18, 0x6, 0xfffffffffffffe01, 0x9d, "f38ceb7691256f02c1a5c655f3f9549c48e52eb911da2ad4b5b2a7d31ac10f0874f3cc90c54f44958e9c5b046b162b4fe973d60e5c50c5e52f5b81548e84736e317a61d749b3fa870a4743824d35ae08385ec32dfb89d0138c067b82997b5fea71c77ff1f70de360674e24432bd45ef30f9496e32cccb3a3f1288163305bbc1e93966f14c94e8f7b4d4e1bb484daad8b7b4b729129f763d27743dfb979"}]}, 0xf0}}, 0x810) ioctl$KVM_S390_UCAS_MAP(r3, 0x4018ae50, &(0x7f0000000280)={0x6, 0x79a, 0x6}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000300)=0x1, &(0x7f0000000340)=0x4) 00:42:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e0713", 0x58, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:26 executing program 3 (fault-call:4 fault-nth:27): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:26 executing program 1: socketpair$unix(0x1, 0x10000000005, 0x0, &(0x7f0000002b00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={'team_slave_1\x00', {0x2, 0x4e23, @local}}) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x100, 0x75, 0xa9c, 0x1, 0x0, 0x1000, 0x100, 0x1, 0xfffffffffffffffa, 0x4, 0x401, 0xfffffffffffffff7, 0xf8, 0x8, 0xffff, 0x1be, 0x2, 0x8, 0x200, 0x37b, 0x1, 0x1, 0x401, 0xff, 0x8, 0x2, 0x2, 0x7, 0x2e78, 0x8, 0x7, 0x8001, 0xf13, 0x100000001, 0x8001, 0x9, 0x0, 0x2, 0x4, @perf_config_ext={0x0, 0x5}, 0x800, 0xffffffffffff0e4a, 0x5, 0x3, 0x400bbe, 0x6, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x3) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x101500, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x5f8a) r3 = socket$inet6(0xa, 0x80e, 0x134) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x110}}], 0x1, 0x0) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000340)=""/2, 0x2}], 0x2, &(0x7f00000003c0)=""/66, 0x42, 0x7}, 0x2020) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000480)={@mcast2, r4}, 0x14) getpeername$unix(r1, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) 00:42:26 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x2000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:26 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00', 0x3) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f00000000c0)) openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000100)={{0x0, 0x2}, 'port0\x00', 0x72, 0xc00, 0x0, 0x3, 0x200, 0x10001, 0x5, 0x0, 0x1, 0x7b0}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e0713", 0x58, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) socket$kcm(0x29, 0x0, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) 00:42:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x12101, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fdatasync(r1) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x40002000, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:27 executing program 3 (fault-call:4 fault-nth:28): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x80, 0x0) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x4}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)="6c6f3a26b76051b159a9c84a2c60d29800000020") sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 00:42:27 executing program 1: 00:42:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:27 executing program 3 (fault-call:4 fault-nth:29): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:27 executing program 1: 00:42:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xfffffffffffffffc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) fstatfs(r1, &(0x7f0000000080)=""/185) r3 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0xfffffffffffffffa, 0x100) getpeername$packet(r3, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001500)=0x14) sendmsg$xdp(r3, &(0x7f0000001440)={&(0x7f0000000200)={0x2c, 0x7, r4, 0x12}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)}, {&(0x7f00000012c0)="d40fdca103eb2d535854482abefc89a55b3a5554099c7b8197598d166e6a252e2b5d5cabede9380eb4cba2292320596b5e20085db533aa9816a3f9b8155f4b6d06ab8afe2bdfcc764737d4b0b46a9b467b68f39dc11d04f7bb73a6856c93021346594d5b7c1464f5b1df506d9f65f1e2b17c946830f5c1e26906d49850cc52ddfae9bc1c995a30cda2adae65e36d22179f33843a0891601153a048ad59ec79778657d1d1176a8b757d54c1515831e4a9cadb1c614df033a53b42514b51687cc531", 0xc1}, {&(0x7f00000013c0)="55be3df7c8cdc24629a6a56cf8776bf2b0218570c2edcf2f301f17c35a4c24bcff2f36dfaac435eb3d601d4d513a49c1e4c96bcf55f2423c09", 0x39}], 0x4}, 0x20000000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000001480)=[@text16={0x10, &(0x7f0000001280)="0f22dcf40fc71db8be008ee8260f0ffe8eba2100ecc30f23b60f0ff5a4c1ee82", 0x20}], 0x1, 0x1, &(0x7f00000014c0)=[@vmwrite={0x8, 0x0, 0x4a, 0x0, 0x18efc, 0x0, 0x3, 0x0, 0x5}, @efer={0x2, 0x8000}], 0x2) 00:42:27 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xe000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:28 executing program 1: 00:42:28 executing program 3 (fault-call:4 fault-nth:30): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:28 executing program 1: 00:42:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2", 0x5f, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:28 executing program 1: 00:42:28 executing program 3 (fault-call:4 fault-nth:31): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:28 executing program 1: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) waitid(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f000000b000), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) setresuid(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffee1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 00:42:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) 00:42:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:28 executing program 1: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000001a00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:42:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2", 0x5f, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:28 executing program 3 (fault-call:4 fault-nth:32): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:28 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x600000000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:28 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x2000000084) getsockopt$inet_buf(r0, 0x0, 0x50, 0x0, &(0x7f0000000080)=0x3c7) 00:42:29 executing program 1: syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x2040000003, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8000000000000013) sync() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)=0x0) timerfd_create(0xd, 0x800) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) wait4(r1, &(0x7f0000000180), 0x80000000, &(0x7f0000000280)) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000004c0)={'syz'}, 0x0, 0xfffffffffffffff8) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) socket$inet6(0xa, 0x807, 0x7) lsetxattr$trusted_overlay_nlink(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'U+', 0xc2}, 0x28, 0x1) sched_getparam(0x0, &(0x7f0000000040)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) 00:42:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x3fc, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x4000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x6, 0x3d0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000140)={r4, 0x10001}, &(0x7f0000000180)=0x8) 00:42:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) 00:42:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x3, 0x40000) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 00:42:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2", 0x5f, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x4}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)="6c6f3a26b76051b159a9c84a2c60d29800000020") write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 00:42:29 executing program 3 (fault-call:4 fault-nth:33): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000788ffc), 0xfdf6) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000006000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000010404000001007d60b7030000010000006a0a40fe00000000850000000d000000b4000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="9294e17bbcd717975b722b01bf62", 0x0, 0x200}, 0x28) 00:42:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x101, 0x40600) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000280)={"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"}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000140)={0xa, &(0x7f00000000c0)=[{}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}]}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f00000001c0)={0xa466, 0x1, 0x1}) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000180)={r4, 0x3}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:42:29 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x7e00000000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) 00:42:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4", 0x62, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2", 0x5f, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0xfffffffffffffffd, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) semget$private(0x0, 0x2000000000007, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:29 executing program 3 (fault-call:4 fault-nth:34): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2", 0x5f, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x81, 0x0) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f00000000c0)=0x0) ioctl$VIDIOC_S_STD(r3, 0x40085618, &(0x7f0000000100)=r4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2", 0x5f, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4", 0x62, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4", 0x62, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:30 executing program 3 (fault-call:4 fault-nth:35): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x1001, 0x1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x2714, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:30 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x1000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) 00:42:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4", 0x62, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4", 0x62, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:30 executing program 3 (fault-call:4 fault-nth:36): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4", 0x62, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:31 executing program 3 (fault-call:4 fault-nth:37): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$SG_GET_LOW_DMA(r3, 0x227a, &(0x7f0000000140)) getsockopt$inet6_dccp_int(r3, 0x21, 0xa, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 00:42:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:31 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x10000000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x2, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) 00:42:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='/trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:31 executing program 1 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$clear(0x7, r3) 00:42:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb", 0x63, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000280)) 00:42:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='%trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb", 0x63, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) 00:42:32 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xfe80, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0xfffffffffffffff9) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f00000000c0)={0x1f, 0xe36, 0xfffffffffffff5f5}) 00:42:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='.trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb", 0x63, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='b%rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xdc, r3, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x9, 0x2}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x1b}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffff581}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x40}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xefb10000000}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xdc7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x21}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5c43}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x10}, 0x40) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:42:33 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000002c0)={0x0, 0x0, 0x80de}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000300)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000340)={r1, r2, 0x2ab}) r3 = socket$inet6(0xa, 0x400000000000803, 0x8) getsockopt$inet6_opts(r3, 0x29, 0x3f, &(0x7f0000000180)=""/154, &(0x7f0000000240)=0x9a) ioctl(r3, 0x400001000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x10000000001) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0185500, &(0x7f0000000100)={0xa1, 0x10}) sendmsg$nl_generic(r0, &(0x7f0000000600)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0xf8, 0x29, 0x400, 0x70bd26, 0x25dfdbfe, {0xe}, [@generic="0f4a02fde659d7f7d8176faa48df0f3dd5c5259f998d816dd769bfa4f2ee44463ae002d9914c51df26cc81bdaebe625954aa7003e8a88507365e7ff3be80d2b1ba13d42cec02ba2c49a4ef12b4e0485042852c6da9b03d4bc6ea7fa7efe0a60d4a0a9839e1abb9a60a8a654faa1c3c75aab5ad7600fff5f223e6c57d4b8ad2f7b442af789d1562414009ecb5219837e86a086140a88410ab8e952e813641e543bb8b4fd9c882124ecf91a4c86a542dfcd72587ff1c5874095fdf2c2e796a8465d28c3dafda01ec400fd6ca89871d4d9472e5731fcbc847af9f50fe9106a084a763"]}, 0xf8}, 0x1, 0x0, 0x0, 0x4080}, 0x20000800) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000440)=0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x1000, 0x2, 0x8001, 0x0, 0x0, 0x3, 0x0, 0x4, 0xffffffff, 0x6, 0x100, 0x7, 0x6, 0x2, 0x5c8, 0x7, 0x1, 0x8, 0x7, 0x101, 0x5, 0x72, 0x20, 0x3, 0x401, 0x5, 0x3, 0x7c16, 0x5, 0x8, 0x10000, 0xfffffffffffffffa, 0x800, 0x1, 0x8001, 0xb23, 0x0, 0x20, 0x4, @perf_bp={&(0x7f0000000380), 0x2}, 0x10000, 0x98, 0x3, 0x7, 0x5, 0x7, 0x94}, r5, 0x6, r0, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x8000}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000080)={r6, 0x3}, 0x8) 00:42:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x8000000000000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0xfffffffffffffffe, 0x2, 0x6000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0xa4d, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x200040, 0x0) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000140)=""/28) 00:42:33 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xd8000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='b/rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x2000, 0x0) 00:42:33 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000340)={0xffffffffffffffff}) setxattr$security_smack_transmute(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000700)='TRUE', 0x4, 0x2) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x4e21}}) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000100)=0x8) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) r4 = accept$inet(r3, &(0x7f0000000980)={0x2, 0x0, @multicast1}, &(0x7f00000009c0)=0xfffffffffffffc1e) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000e40)="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", 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r4, 0x40106614, &(0x7f0000000300)={0x0, @aes256}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000640)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460000000000000000005aced12135d7d66f0000000100000000000000400000000000000000000000000000003800eeff0000000000000000efffffffffff00000000000000000000000000000000000000000000000000f4ffffff00000000000000001f0000000400001000e58eb838d9a5dc6a53aeed00000000007b00fbf8b677ad990e1e0fcbc9a17b696bb0d1657ae94e12466c111c779a31b6b387face49b4e4dad70fbe9baafa30d602a4a82efe552836f3d33c2cd0cc9e9518189d390697ee4fe4b4fd2830fb658e65150720fcf80c73886bbb3e004c7c9eb3a77ddce52064cd234882e83bec86af09932127"], 0xc1) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$BLKBSZGET(r5, 0x80081270, &(0x7f0000000380)) r6 = memfd_create(&(0x7f00000003c0)="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", 0x0) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f0000000180)='&', 0x1}], 0x1, 0x81003) sendfile(r0, r6, &(0x7f00000ddff8), 0x80000004) 00:42:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='%trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x7b, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) connect$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, [], 0x1c}, 0x761}, 0x1c) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_CPUID2(r4, 0xc008ae91, &(0x7f0000000080)={0x5, 0x0, [{}, {}, {}, {}, {}]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 00:42:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='bt%fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp6\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{}]}) preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/250, 0xfa}], 0x1, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20011000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x154, r2, 0x210, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x14}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @broadcast}}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x66}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast1}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x4bce47a327722fd3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x91}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x76}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x40000}, 0x4) 00:42:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) 00:42:37 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x10000120, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:37 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x6365c21d, @dev={0xfe, 0x80, [], 0x21}, 0x900000000000}}, 0x1, 0x1, 0x80000000, 0x8, 0x16}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r1, 0x2}, &(0x7f0000000200)=0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x179) exit(0x0) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r4, r3) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000040)={0x8, 0x4, 0xfffffffffffffff7, 0x8000}) 00:42:38 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x800, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000000c0)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/kvm\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0xa, &(0x7f0000000100)='/dev/rtc0\x00'}, 0x30) tkill(r2, 0xa) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x5000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [0x40000021, 0x1001, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) 00:42:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='bt/fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) 00:42:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='b%rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:38 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000200)={0x800, 0x7, 0x4d, 0x4, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}]}) socket(0x11, 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000280)={{0x6a, 0x9}, {0xfffffffffffffffd}, 0x4, 0x1, 0x8}) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000300)=0x2) 00:42:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x200000000000000, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000000)={0x0, 0xeb2}, 0x0) 00:42:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e20, 0x1, @loopback}, {0xa, 0x4e21, 0x0, @empty, 0x3cc65b4}, 0x2, [0x5, 0x0, 0x40, 0x7fffffff, 0x1, 0x3, 0x0, 0xffffffff]}, 0x5c) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x400841, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f00000000c0)=0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ipv6_route\x00') sendfile(r2, r4, 0x0, 0x80008) 00:42:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:38 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x1000000000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) 00:42:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000000cc0)=[{{&(0x7f0000000000)=@l2, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)}], 0x1, &(0x7f0000000100)=""/33, 0x21, 0x3ff}, 0xffffffff}, {{&(0x7f0000000140)=@l2, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/118, 0x76}, {&(0x7f00000003c0)=""/144, 0x90}, {&(0x7f0000000480)=""/175, 0xaf}], 0x3, 0x0, 0x0, 0xcf18}, 0x1}, {{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000600)=""/145, 0x91}], 0x2, &(0x7f00000006c0)=""/46, 0x2e, 0x9}}, {{&(0x7f0000000700)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000780)=""/155, 0x9b}, {&(0x7f0000000840)=""/189, 0xbd}], 0x2}, 0x88f1}, {{&(0x7f0000000940)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000c00)=[{&(0x7f00000009c0)=""/159, 0x9f}, {&(0x7f0000000a80)=""/184, 0xb8}, {&(0x7f0000001840)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/149, 0x95}], 0x4, &(0x7f0000000c40)=""/112, 0x70, 0x2}, 0x1f}], 0x5, 0x40000000, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001800)={"5663616e3000000000000000010900", r1}) r3 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@bridge_newneigh={0x30, 0x1c, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, r2, 0x0, 0xff0b}, [@NDA_DST_IPV6={0x14}]}, 0xff3b}}, 0x0) 00:42:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000040)) r1 = accept(0xffffffffffffff9c, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000100)=0x80) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x88}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000001c0)={r3, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000340)={r3, 0x54, &(0x7f0000000280)=[@in6={0xa, 0x4e22, 0x9, @loopback, 0x800}, @in6={0xa, 0x4e20, 0x7fff, @remote, 0x3}, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast1}, 0x4}]}, &(0x7f0000000380)=0x10) r4 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x1, 0x8200) ioctl$TIOCMSET(r4, 0x5418, &(0x7f0000000240)=0xcb) 00:42:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:39 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1) 00:42:39 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x7a}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000001c0)={0x1, 0x0, @ioapic={0xf000, 0x7, 0x4, 0x8, 0x0, [{0xca1, 0x8000, 0xffffffffffffbe03, [], 0x9}, {0xffffffff, 0x1000, 0x527, [], 0x9}, {0x8000, 0x7, 0x6, [], 0x10001}, {0x3, 0x81, 0x5, [], 0xeac}, {0x3, 0x5, 0x5, [], 0x8f5}, {0x2, 0x401, 0x8, [], 0x6}, {0xfffffffffffffffc, 0x400, 0xfc3000, [], 0xea21}, {0x4b, 0x7, 0x1}, {0xa41, 0x200, 0x7ff, [], 0x7}, {0x7, 0x8000, 0x796, [], 0x6}, {0x2cdfd77f, 0x0, 0xd32f, [], 0x80000000}, {0x9, 0x0, 0x7, [], 0x6}, {0xa57c, 0x1, 0x7, [], 0xe39c}, {0x80000000, 0x2, 0x5, [], 0x80000001}, {0x8, 0x8, 0x8, [], 0x401}, {0xb52, 0x7fff, 0x100000000}, {0x0, 0x3, 0x1}, {0x81, 0x9, 0x7f, [], 0x800}, {0x5, 0xffffffff, 0xffffffffffffff7f, [], 0x5}, {0x0, 0x7, 0x8, [], 0x7}, {0x2, 0x9c, 0x3af, [], 0x1}, {0x3, 0xfa3, 0x6, [], 0x6056}, {0x7, 0x4, 0xfffffffffffffff8}, {0xd67b, 0x709f, 0x1, [], 0xfff}]}}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000100)={0x3}) r3 = dup(r2) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x4008af13, &(0x7f00000127c0)={'team0\x00'}) connect$llc(r3, &(0x7f0000000000)={0x1a, 0x108, 0x9, 0x7fff, 0x800, 0xea, @remote}, 0x10) write$vnet(r2, &(0x7f00000002c0)={0x1, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x68) close(r0) ioctl$KVM_ASSIGN_PCI_DEVICE(r3, 0x8040ae69, &(0x7f0000000080)={0x3, 0x1, 0x401, 0x4, 0x2}) 00:42:39 executing program 5 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:39 executing program 5 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:39 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x8000) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000140)=0xc02, 0x4) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000040)=""/70, &(0x7f00000000c0)=0x46) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000100), 0x4) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$SG_IO(r2, 0x227c, 0x0) 00:42:39 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x10000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:39 executing program 5 (fault-call:1 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x8000, 0x1, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200008000f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 00:42:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:39 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x2, 0xa14, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, 0x0, &(0x7f0000001100)=ANY=[@ANYBLOB="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"]}, 0xa8c) 00:42:39 executing program 5 (fault-call:1 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:39 executing program 0: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket$inet6(0xa, 0x803, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000180)={0x0, 0xd8, "284187aad066ec6b6c10f2287da36174f3b5592c5408b2a35e7d08cf13df94efdba50ba8e833c4a8d8726481fc89642fbc9013b4470fcc388984553153b396e405367b2e63f8d53c2febdfa82b8739793379f58d607a8c4119422bdc20615646f170eb6c53ad188f150f10fc3b4abeacfc044c1c1ff29edec915d90aecdd8896cabc428794902aa3908479cc8f4bb94c35b83c2e19b77ef92610e1c392c26d0b58a8e439544b067343bc3eb6d4dfc953bccd00704b91c949a807e077a276867faadd0f1494ac9549b8f81c335e87a4b75470998b32191d30"}, &(0x7f0000000000)=0xe0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000000c0)={r2, 0x2db6, 0x58, "f23c56130d48b61add5fec5151c37951d4c0c526b181e57f76056fcc58659fcf299c4d3ee0b0d471f5305d2f5283258024c8fbed1bf5a5d82b5f7276321eff9abc8ba5b9b693a34d7820541dd2092c335fe6187d4df1e62d"}, 0x60) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000380)={0xfc20, {{0xa, 0x4e22, 0xfffffffffffffffb, @mcast2}}, {{0xa, 0x4e21, 0x9, @empty, 0xfffffffffffffffb}}}, 0x108) keyctl$get_keyring_id(0x15, r0, 0x2000000) 00:42:40 executing program 5 (fault-call:1 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000100)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x2) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x7c, &(0x7f0000000000)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f00000000c0)=0x90) 00:42:40 executing program 0: r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x10000, 0x0, 0x101, 0x0, 0x4000000000000, 0x0, 0x0, 0x1ff, 0x0, 0x81, 0x0, 0x1}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x80280, 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000003c0)=0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) get_robust_list(r2, 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) socket$inet(0x2, 0x0, 0x4) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) keyctl$join(0x1, &(0x7f00000002c0)={'syz', 0x0}) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r3 = socket$inet6(0xa, 0x2, 0x0) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x1) getsockopt$inet_int(r0, 0x0, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0xffffffffffffffe8) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) 00:42:40 executing program 5 (fault-call:1 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000080)=0xff, 0x4) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0xf0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@bridge_getneigh={0x28, 0x1e, 0x607, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x5000000}]}, 0x28}}, 0x0) 00:42:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:40 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xa00, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:40 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x2a6) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) read(r0, &(0x7f0000000180), 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3, 0x40080) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x6, 0x0) ioctl$TIOCSBRK(r2, 0x5427) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="2c20e7d2b8cf541ec1037e57863655f7d2882391e2b85d3e1cf49f47829d11ee382b38cd3cae39e83af318857aa5a676d0c37ab9c826116523a32ac3cfea5cb4be7f61c95d125e3e059079596cdb838e6f4bf13b632cfef1debd"], 0x1e4) 00:42:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000000000e86cdf3330b0efdf8d02eec82e94cbb783aa6590d97499e0a825e3e7ebc5eef04d7446fed8519727e1bda2b4a3dfa49153097b4a33eab3b3e78abdf7a3c14fe4af3f490915f9c362bd3553ffb8fe9f9da5f66c812f94429b949a27559c180f7f54797971327d5ca0f2baeaa5a24f59d201eda4f5b9691e17b1d1a11218d3552d70c5244ab81983bd90add858c2ea5e36d9cccb899eb9e11c12ff8037793c8109ff4b1bc00b388778f639590d9adab1a5474f916cc0386fe0651274488461ba", @ANYRES32=0x0, @ANYBLOB="000000000000000008001c00", @ANYRES32, @ANYBLOB="1400030076659368305f746f5f62726964676500632e3e94e14e74e546c1597ff5000a99b3192e3a186a8bd55279b2e28e2a5e743528ad90b03e5735bb27cbdd77247f55b6a8f884bbda7fbbeb"], 0x3c}}, 0x0) 00:42:40 executing program 5 (fault-call:1 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:40 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x80200, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000180)={0x0, 0x0, 0x5, 0x100}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r2}}, 0xc) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00'}, &(0x7f0000000240)=0x54) write$FUSE_GETXATTR(r1, &(0x7f0000000040)={0x18, 0x0, 0x6, {0x80}}, 0x18) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000080)=ANY=[]}) prctl$PR_CAPBSET_DROP(0x18, 0xc) 00:42:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:40 executing program 0: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000001b00)={0x3f, "828bac1665a0f9c663246fbfe7d08b9942d85a9f3af9da56fcda70a786274b56", 0x2, 0x1}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=""/1}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) sendmsg$nl_route_sched(r2, &(0x7f0000001940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100108}, 0xc, &(0x7f0000000200)={&(0x7f0000001b40)=ANY=[@ANYBLOB="981500002900000027bd7000fbdbdf2500000000", @ANYRES32=r3, @ANYBLOB="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"], 0x1598}}, 0x40004) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f9, &(0x7f0000001980)="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") 00:42:41 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0), 0x57, 0x0, &(0x7f0000000100)="a1472f5bc606769aa268320cddf576e46abcca67918ec7c90a9e4b8d4911540e7f9021cb553e5012282d2b50f4735c17f9446518f5ff444f7880986cf956ec213b42f1b42fb845ea4e7a5cf698268138c22511a2b29372"}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x3, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) sync_file_range(r1, 0x1, 0x3, 0x5) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='.', &(0x7f0000000000)='vfat\x00', 0x0, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000240)={[], 0x8001, 0x7ff, 0x3, 0x8, 0x5, r3}) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x20000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$netlink(r0, &(0x7f0000000200)=@proc={0x10, 0x0, 0x25dfdbfe, 0x1002000}, 0xc) r6 = accept4(r4, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) setsockopt$inet6_int(r6, 0x29, 0x33, &(0x7f0000000040)=0x100000000001f, 0x87) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 00:42:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:41 executing program 0: socketpair(0xfffffffffffffffc, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000300)=0x1, 0x4) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000001c0)) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x3, 0x4, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r3, &(0x7f0000000100), &(0x7f0000000140)}, 0x20) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000100)=0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r3, &(0x7f00000003c0)="134097", &(0x7f0000000340)=""/113}, 0x18) 00:42:41 executing program 5 (fault-call:1 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:41 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xd800, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) unshare(0x24020400) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) readahead(r2, 0x0, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000500)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_IFNAME={0x14, 0x3, '%p6_vti0\x00'}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x40}}, 0x0) 00:42:41 executing program 2: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='\a\x00'}, 0x10) r1 = dup3(r0, r0, 0x80000) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000040)=0x25fb, 0x4) r2 = gettid() close(0xffffffffffffffff) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000000000000000000000200008e00000006000000000000000000000000000000000000000000000000000000dcefcd1719e2150b4b21247dc91681a334c1a8d2e656022ef5ba95f61005758e899a08ef46d7b4f8467da6afb3508f69ef465390bd9924574f79ec7ae4db447eb398c1015db81c38430d4b3e"]) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x76b) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x6f, 0x80000001, 0x5, 0x0, 0x0, 0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x9, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x7, 0x5, 0x0, 0x7ff, 0x9, 0x0, 0x1, 0x0, 0x8000, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff00000000, 0x6}, 0xf12, 0x0, 0x100, 0x0, 0x4, 0x0, 0x2}, r2, 0x0, r3, 0xb) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) getpid() openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000480)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000280)) setpriority(0x1, r2, 0x2f) close(r4) 00:42:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000100)="baf80c66b8963b008d66efbafc0cb85709eff20f30f20f23f9f641016a9d0f5232660f3a17f2f366b9d30800000f320f20110fae75c6"}], 0x1, 0x8, &(0x7f00000000c0)=[@vmwrite={0x8, 0x0, 0x800, 0x0, 0xe427, 0x0, 0x79, 0x0, 0xffff}, @flags={0x3, 0x20000}], 0x100000da) fallocate(r0, 0x0, 0x9, 0x4) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f00000002c0)={0x1869, 0x80000000, 0x10001, 0x24, &(0x7f0000000140)=""/36, 0x24, &(0x7f0000000180)=""/36, 0xe5, &(0x7f00000001c0)=""/229}) 00:42:41 executing program 5 (fault-call:1 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:41 executing program 5 (fault-call:1 fault-nth:9): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:42 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000180)) r2 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x2001) write(r2, &(0x7f0000000280)="101207b5481965d16ef17dec31393667d0ac15e2e7ea8e4a0e6980ab2f13251a0487409ee4256e638be9971c38ddb2faf89b4b3b53c5013b763f91ea2cc7b90d22d3a4e16ba7b40317e71d1986ae5ebb03ef4c5544feb528bfd6f92ef56ecedaf679d0b308d106eff55640d5", 0x6c) ioprio_get$uid(0x3, r1) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000040)='.\x00', &(0x7f0000000240)='rootfs\x00', 0x0, &(0x7f00000000c0)='/^bdev\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rfkill\x00', 0x400000, 0x0) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000340)) 00:42:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:42 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) ioctl$int_in(r0, 0x800000c0065006, &(0x7f0000000280)) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8}, 0x311) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000100}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="a0000000", @ANYRES16=r1, @ANYBLOB="000227bd7000fddbdf25030000000c00020003000000000000000c00020008000000000000000c00020002000000000000000c00080000040000000000000c00070008000100", @ANYRES32=r0, @ANYBLOB="08000100000000000c00020005000000000000003400070008000100017aa6211d239ad2a9a3e0052e97bca52180acc25e7eb8f1bc58cb6a452fb5ea01381149822fb4868b114d", @ANYRES32=r0, @ANYBLOB="09000300", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="0800010000000000"], 0xa0}, 0x1, 0x0, 0x0, 0x8890}, 0x8000) 00:42:42 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x12c, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0xb, 0x0, &(0x7f0000000040)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x28000, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000080)={0x100, 0x5, 0x4, 0x8, 0xfffffffffffffffa, 0x0, 0xffffffff, 0xc60, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r2, 0xffffffffffffffff, 0x30}, 0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e20, 0xc95}}, 0x80, 0x1}, 0x90) 00:42:42 executing program 5 (fault-call:1 fault-nth:10): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:42 executing program 2: syz_open_dev$video4linux(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x0, 0x80) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000540)=ANY=[@ANYBLOB="010400000000000002004e24ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000500000002004e21ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ac14140f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000003f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009c9e004e237f000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x310) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) syz_genetlink_get_family_id$ipvs(0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000140)={0x3, 0xffffffffffffff9c}) getsockname(r0, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x80) sendfile(r1, r2, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000180)={0x1, 0x0, @ioapic={0x0, 0x100000000, 0x232, 0x800000000, 0x0, [{0x8, 0x7, 0x6, [], 0x4}, {0xffff, 0xffffffffffffffff, 0x1, [], 0x8}, {0xffff, 0x401, 0xfff, [], 0xff}, {0xd8, 0x0, 0x4, [], 0x4}, {0x80000000, 0x5, 0x5, [], 0x800}, {0xe61, 0x101, 0x0, [], 0x612}, {0x400, 0x3, 0xde81, [], 0x9}, {0x4, 0x400, 0x6, [], 0x8315}, {0x0, 0x400, 0xfffffffffffffffe, [], 0x2}, {0xfffffffffffffff9, 0xbb, 0x3, [], 0x7}, {0x4, 0x6, 0x3, [], 0xdd}, {0x8, 0x1f, 0x7, [], 0xfed}, {0x0, 0xfffffffffffff865, 0xff, [], 0x8}, {0x6, 0x7, 0x100000001, [], 0x2}, {0x20, 0x1ff, 0xc48, [], 0x2}, {0xf6f, 0x5, 0x7, [], 0x907}, {0x1f, 0x4, 0x0, [], 0xe9e}, {0x2f2, 0x831, 0xdca, [], 0x3298}, {0x6, 0xfffffffffffffc4f, 0x0, [], 0x1}, {0x7f, 0x1d, 0x1, [], 0x1}, {0x7, 0xdfc3, 0x2}, {0x6, 0x5, 0x6, [], 0x80}, {0xa6, 0x5, 0x1, [], 0x4}, {0x7fffffff, 0x7ec, 0x9}]}}) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x4, 0x0, 0x3, 0x2, 0x9, 0x2067, 0x2}, 0x20) 00:42:42 executing program 5 (fault-call:1 fault-nth:11): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:42 executing program 5 (fault-call:1 fault-nth:12): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x2) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c65300a39980cfd42119ce10403000000000000000000000000000000"], 0x24) 00:42:43 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4000000000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:43 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x10000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0207000002000000000000009d6e0000de6679a6785b79fdca308cfdecf5f103edf92593"], 0x10}}, 0x0) dup3(r0, r0, 0x0) 00:42:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:43 executing program 5 (fault-call:1 fault-nth:13): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:43 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200008c0], 0x0, &(0x7f0000000200), &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}, 0x2ad) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x101000, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xfffffffffffffffe, 0x0) r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12) 00:42:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:43 executing program 0: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x1c6) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000001c0)={0x1, 0x5, [@remote, @remote, @local, @local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r0, 0x0, 0xb, &(0x7f0000000200)='&*/selinux\x00'}, 0x30) getresuid(&(0x7f0000000280), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={r1, r2, r3}, 0xc) syz_open_dev$loop(&(0x7f0000003640)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x21) ioctl$int_in(r0, 0x5421, &(0x7f0000000400)=0x1) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$LOOP_GET_STATUS64(r5, 0x4c07, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000100)={r6, 0x401, 0x0, 0x8, 0x2, 0x2800}, &(0x7f0000000140)=0x14) 00:42:43 executing program 5 (fault-call:1 fault-nth:14): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000600, 0x20000630, 0x20000660], 0x0, &(0x7f0000000400), &(0x7f0000000380)=ANY=[]}, 0x78) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) connect$l2tp(r3, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @remote}, 0x0, 0x4, 0x3}}, 0x2e) sendto$inet(r1, &(0x7f0000000100), 0xfffffffffffffe78, 0x8082, &(0x7f0000000140)={0x2, 0x0, @remote}, 0xfd9cd5d48dd5d271) 00:42:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:44 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)="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", 0xd23) r1 = memfd_create(&(0x7f00000016c0)='security.ima\x00', 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000001700)={0x0, 0x3}, &(0x7f0000001740)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000001780)={r2, 0x3}, &(0x7f00000017c0)=0x8) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r3, 0x4) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000d0}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="0810"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4000010) sendto$inet6(r4, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r4, &(0x7f0000001500)=ANY=[@ANYBLOB="478b5fea962494658dc2633cef9ec2390c5ed00a2ca8d4e35bd61960f0a7c6e0bc3391e733eaa1f165ae2e6776792a50923ee0f945833daeaf70993c4d6644cf4eb64957c50fb3b65dee0593a90be1aa56f8ba924bf408eec6d4714481a9d847d026af0f795aee6a6e9cc5135844321ad6e866dd919d7283f59cf0da6300d6f660599e3da0fec4f8d69a5062bfce8e0863a9993c7de5c3a99a9b0000000000000000000019f6f5f9bae17a32ac24d2891214fb869d9d1bdc1483e0cf76e738e77ee96e6c0ebd00009991a900"], 0xcc) r5 = accept4(r3, 0x0, &(0x7f0000000040), 0x0) getsockname$inet6(r3, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f00000002c0)=0x1c) setxattr$security_ima(&(0x7f0000001400)='./file0\x00', &(0x7f0000001640)='security.ima\x00', &(0x7f0000001680)=@v1={0x2, "da7c6c3748a31f8c0d0a"}, 0xb, 0x3) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000440)={0x401, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, {0x2, 0x4e21, @local}, {0x2, 0x4e21, @loopback}, 0x1, 0x1, 0xfff, 0x6ea6, 0x1f, 0x0, 0x2, 0x1380000000000000, 0x600000}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB="993838d10610e3c4fdada830a9432860f8740c24a921061a1c9aeed337d0de65ab"], 0x1}}, 0x80) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/zero\x00', 0x200003, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, 0xffffffffffffffff) writev(r5, &(0x7f00000014c0)=[{&(0x7f0000001440)="f7485caf1d3714b8aee514ebea8103996d126e94295352b261c40fe864d9613eb501c24e9021d6ce5d3fae9a351641e71eb546b4a0ebae84d22d8515b7aa6fa58e8750bfd69c7c96bc9a2b19dcc5eb12c063000e4c0e4d19", 0x58}], 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x7fff, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000000200)={0x5, 0x10, 0xfa00, {&(0x7f0000001200), r7, 0x1}}, 0x18) r8 = geteuid() fstat(r0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001900)={0x78, 0x7d, 0x2, {{0x0, 0x5e, 0xfb, 0x400, {0x80, 0x3, 0x4}, 0x100000, 0x1, 0x100000000, 0x6, 0xe, '*]prockeyring+', 0xa, '/dev/zero\x00', 0xd, 'security.ima\x00', 0x6, 'system'}, 0x5, 'IPVS\x00', r8, r9}}, 0x78) dup3(r0, r5, 0x80000) 00:42:44 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x5, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="920f34"]) process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000580)=""/153, 0x99}, {&(0x7f00000011c0)=""/4096, 0x1000}, {0x0}], 0x3, 0x0) syz_open_dev$audion(&(0x7f0000000840)='/dev/audio#\x00', 0x0, 0xbd) lsetxattr$security_ima(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.ima\x00', &(0x7f0000000940)=ANY=[], 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) open(0x0, 0xb00, 0x0) 00:42:44 executing program 5 (fault-call:1 fault-nth:15): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:45 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hci(r0, 0x400448e0, &(0x7f0000000000)="ad25164903e9a4be2b38") ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8990, &(0x7f0000000080)='ip6tnl0\x00') 00:42:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:45 executing program 5 (fault-call:1 fault-nth:16): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x16) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x14, r1, 0x701, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) shmget(0x0, 0x4000, 0x40, &(0x7f0000ffb000/0x4000)=nil) socketpair(0x8, 0xa, 0x9, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$EVIOCSABS3F(r3, 0x401845ff, &(0x7f00000001c0)={0x8, 0xff, 0xffff, 0x71, 0x76}) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r2, &(0x7f0000000140)={0x80000000}) 00:42:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:45 executing program 0: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f0000000340)='./file0\x00', 0xe800, 0x1, &(0x7f0000000540)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x18, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x532b40aac2b24edb) recvfrom$inet(r0, &(0x7f0000000880)=""/207, 0xcf, 0x12100, &(0x7f0000000240)={0x2, 0x4e22}, 0x10) sendto$unix(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x40881, 0x0, 0x0) fchdir(r0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000004c0), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000019c0)={0x0, r0, 0xf, 0x1}, 0x2) write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "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", 0xff54}, 0x1006) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f00000001c0)=0x40, 0x4) stat(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)) syz_extract_tcp_res(&(0x7f0000000140), 0x5, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000100)={r1, 0x0, 0x5, 0x0, 0x1}) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000480)) accept$inet(r0, 0x0, &(0x7f0000000840)) 00:42:45 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x11000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:45 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f00000002c0)={@local}, 0x14) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x4) close(r0) 00:42:45 executing program 5 (fault-call:1 fault-nth:17): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrf/\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f0000000000)=""/1, 0x1, 0x12022, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x8800, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000840)={0x0, 0x2}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000c00)={r2, @in={{0x2, 0x4e24}}, 0x6, 0x8}, &(0x7f0000000cc0)=0x90) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x1) mkdir(&(0x7f0000000b80)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000340)=0x0) process_vm_writev(r3, &(0x7f0000000880)=[{&(0x7f0000000380)=""/158, 0x9e}, {&(0x7f0000000440)=""/210, 0xd2}, {&(0x7f0000000540)=""/8, 0x8}, {&(0x7f0000000580)=""/4, 0x4}, {&(0x7f00000005c0)=""/170, 0xaa}, {&(0x7f0000000680)=""/177, 0xb1}, {&(0x7f0000000740)=""/82, 0x52}, {&(0x7f00000007c0)=""/1, 0x1}, {&(0x7f0000000800)=""/12, 0xc}, {&(0x7f0000000840)}], 0xa, &(0x7f0000000b40)=[{&(0x7f0000000940)=""/116, 0x74}, {&(0x7f00000009c0)=""/44, 0x2c}, {&(0x7f0000000a00)=""/240, 0xf0}, {&(0x7f0000000b00)=""/36, 0x24}], 0x4, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x2080, 0x8) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devtmpfs\x00', 0x0, &(0x7f00000002c0)='\\\x00') 00:42:46 executing program 5 (fault-call:1 fault-nth:18): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:46 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) getsockname(r0, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000000c0)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x117, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x3, {0xa, 0x4e22, 0x1, @mcast2, 0x8000}, r2}}, 0x38) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) 00:42:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:46 executing program 0: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x800000000000006) r0 = socket$kcm(0x29, 0x5, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000301ff8), 0x0) mount$9p_tcp(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xc000, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e733d7463502c706f72743c3008000000000000003030303030346532302c63616368653d6eb186fda7755a95c27572652c00ff160c87a0cdc6f32795aaa92c650d09328c4c7202e057c6652394b291e703d3540de23d08923d428f64a44bc5ee1cdcf19d350e6161a33a1a5cbfb1f1db108e521f76a67f0c600eaeb8798626c5466dcca932815a082b04a0050642e00b5da86f3c0941fdac8f3aa0ec08ed06000000d9b8dd0080aa0914d026f332e2f992d0f48b00000000000000000000000000496bcadd36bccb1b8bb5034afa3d6dead7d1e6238c08367346"]) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000004c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000280)={@loopback, 0x2c}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x3ac, 0x3ef, 0x5, 0x30c, 0x0, 0x1d3, 0xe003, 0x33c, 0x0, 0x0, 0x0, 0x0, 0x8]}}) r2 = syz_open_dev$video(&(0x7f0000000480)='/dev/video#\x00', 0x100000007fffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={@local, @empty={[0x0, 0x0, 0x0, 0xd9]}, @loopback, 0x0, 0x0, 0x1f, 0x54010000, 0x100000000}) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000240)={0x200, 0x6, 0x5}) socket$rds(0x15, 0x5, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/video36\x00', 0x2, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x81}, &(0x7f0000000180)=0x8) 00:42:46 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x7e00, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="79c10004000038427d33428d0f"], 0x1}}, 0x44801) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000200)={'teql0\x00', {0x2, 0x4e23, @local}}) ioctl$VT_RELDISP(r1, 0x5605) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000440)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000340)={0x0, 0x4, 0x3, 0xa91, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f0000000480), &(0x7f00000004c0)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000003c0)={r2, 0x2, 0x30}, &(0x7f0000000400)=0xc) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000300)=0x6) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000330e10b0, @empty, [0x0, 0x3e8]}, 0x0) clock_gettime(0x0, &(0x7f0000000240)) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000040)) 00:42:47 executing program 5 (fault-call:1 fault-nth:19): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:47 executing program 2: syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x80000000, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)=0xfa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = request_key(&(0x7f0000000140)='blacklist\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='/dev/input/mouse#\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000100)='\x00', r1) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80020000005e510befccd7", 0x2e}], 0x1, &(0x7f00000013c0)}, 0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) 00:42:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:47 executing program 2: syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x80000000, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000280)=0xfa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = request_key(&(0x7f0000000140)='blacklist\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='/dev/input/mouse#\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000100)='\x00', r1) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80020000005e510befccd7", 0x2e}], 0x1, &(0x7f00000013c0)}, 0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) 00:42:47 executing program 0: prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000002080)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/250, 0xfa}], 0x1, &(0x7f0000000140)=""/3, 0x3, 0x7fff}, 0x4}, {{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000002c0)=""/25, 0x19}, {&(0x7f0000000300)=""/180, 0xb4}, {&(0x7f00000003c0)=""/209, 0xd1}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x4, &(0x7f0000001500)=""/12, 0xc, 0x7}, 0x101}, {{&(0x7f0000001540)=@hci, 0x80, &(0x7f0000001800)=[{&(0x7f00000015c0)=""/203, 0xcb}, {&(0x7f00000016c0)=""/100, 0x64}, {&(0x7f0000001740)=""/45, 0x2d}, {&(0x7f0000001780)=""/93, 0x5d}], 0x4, &(0x7f0000001840)=""/163, 0xa3, 0xc032}, 0x401}, {{0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001900)=""/162, 0xa2}, {&(0x7f00000019c0)=""/152, 0x98}, {&(0x7f0000001a80)=""/109, 0x6d}], 0x3, &(0x7f0000001b40)=""/21, 0x15, 0xd56f}, 0x8}, {{&(0x7f0000001b80)=@l2, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001c00)=""/16, 0x10}, {&(0x7f0000001c40)=""/179, 0xb3}, {&(0x7f0000001d00)=""/239, 0xef}, {&(0x7f0000001e00)=""/119, 0x77}], 0x4, &(0x7f0000001ec0)=""/86, 0x56, 0xb47}, 0x5}], 0x5, 0x10001, &(0x7f00000020c0)={r1, r2+10000000}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa1) getsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000000)={@dev, @remote, @multicast2}, &(0x7f0000000040)=0xc) setresuid(0x0, r4, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r5, 0x8b35, &(0x7f0000000180)={"59756e6c300000000000000000f12000", @ifru_ivalue}) 00:42:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000048, 0x0, 0x0, 0x80000001}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000003040), 0x400000000000083, 0x0) 00:42:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:47 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xa}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000440)={@in6={{0xa, 0x4e21, 0x101, @mcast1, 0x3a}}, 0x2, 0x800, 0x5, "e816c54a41357ae87fe65d7baff25a78602d9472d3d4fe100d7e3c4cab63b2b3716f53e4f088f4b88b2a8cfb2e0c145c23aa898e6575e1ec1f895e0aeed66dd57f838e16868bcb39607913acd1ff729c"}, 0xd8) close(r1) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r4 = accept$alg(r3, 0x0, 0x0) clock_settime(0x7, &(0x7f00000002c0)) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r5, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f000007d000)="b3", 0x1}]) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x11, 0x0, 'lblc\x00'}, 0x2c) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0x2c) r8 = socket$l2tp(0x18, 0x1, 0x1) bind$nfc_llcp(r7, &(0x7f0000000380)={0x27, 0x1, 0x1, 0x3, 0xf7aa, 0x1, "0de1a68a6dde6fd442a6a6566c4033904557c577aba9421e119997bdcbc56137500698b4b9948580dceb5a2035d4ce0a0f494083cd91e664e33fb1aca74893", 0xb}, 0x60) connect$l2tp(r8, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="627472667373657200953a817ee95265d752eed6252330f51ced72beb3ab0a816527fc9534a95577e550f0cf770e98957c3492fd0200000000000000c83cc0fdd6faa58d2a5a66360d5bd0899eb82744000000000000"], &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000140)={r9, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r10, 0x80045700, &(0x7f0000000580)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000540)) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x100, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r10, 0x8004e500, &(0x7f0000000340)=r11) sendmmsg(r8, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 00:42:47 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x10, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={&(0x7f0000000100), 0xc, &(0x7f0000000b80)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x621, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0xc, 0x2, [@IFLA_GRE_REMOTE={0x8, 0xe, @remote}]}}}]}, 0x3c}}, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x121000) syz_open_pts(r1, 0x28080) 00:42:47 executing program 5 (fault-call:1 fault-nth:20): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:47 executing program 2: socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x8200, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000900)={0x0, 0xfa1}, &(0x7f0000000940)=0x8) socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x3, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000040)={0x6, 0x3, 0x2, 0x9}) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000000)) read(r1, &(0x7f0000000100)=""/82, 0x52) 00:42:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:48 executing program 5 (fault-call:1 fault-nth:21): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:48 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400000, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) r0 = socket(0x2000000011, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000080)=0x10000000000000, 0x4) memfd_create(0x0, 0x2) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) 00:42:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:48 executing program 5 (fault-call:1 fault-nth:22): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:48 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x3e8, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:49 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0x40bc5311, &(0x7f0000000080)={{}, "706f7274300000000000000000000000000800000000000000000000000000000000000000000000f30000008000"}) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=""/223, 0xdf) 00:42:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:49 executing program 5 (fault-call:1 fault-nth:23): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="62747266737f", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000100)=0x40, 0x4) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="d9a34fff2d847238de8a96cedb1af0ab", 0x10) r1 = accept$alg(r0, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x200, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES32]], 0xfffffdae) read(r1, &(0x7f0000000bc0)=""/93, 0xfffffe0a) 00:42:49 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000180)='.//ile0\x00', 0x0) r0 = syz_open_dev$radio(0x0, 0x1, 0x2) name_to_handle_at(r0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="f7000000f8930000c9d422f72afa3df0d299620e04000000ef63c658a362056d046a091fa90eab2fe46d3d7a853580afc4ef864f8266f9a757e0722639ec8916a11083fd9867ac0fb965d6295777862b9aec12f9eed69445b4e8c3e2c1d61fd44b86027be54a73b7dcb560771f30b286625b0ce69c6d16f186f7fdaa779141310cdbe7e8cfb651c4155b05cde4c399779e1d4b0937cfc675f49efbe42120e42b5b51ca73652fb1724274cfd5c448cbde00e2f9f0fa9fdb364b6c93d2daa9e4726313552910a3b50900000000000000cd2f461f574e3f8c8a003878f51dfe46fd1305ff1f4c3cca6d77153025a65b75b93dd8efb557fe40"], 0x0, 0x400) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f00000002c0)={0x1, 'vlan0\x00'}, 0x18) mount$overlay(0x400000, &(0x7f0000000300)='./file1\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) recvmsg(r4, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) fallocate(r5, 0x8, 0x4, 0x1) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, 0x0, &(0x7f0000000140)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) kcmp(r2, r6, 0x7, r1, r0) write$cgroup_int(r1, &(0x7f0000000000)=0x3f, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000001c0)={0x0, 0x3, 0x0, 0x42d4, 0x3, 0x38e}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000440)=0x7f, 0x4) 00:42:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="627472667384", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:49 executing program 5 (fault-call:1 fault-nth:24): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:49 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x6000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:49 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) llistxattr(&(0x7f0000000040)='./file1\x00', &(0x7f0000000400)=""/4096, 0x1000) fcntl$setlease(r0, 0x400, 0x205) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, &(0x7f00000003c0), &(0x7f00007adff0)={0x77359400}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f00000000c0)='./file0\x00', 0x740) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x2000)=nil, 0x2000}, 0x1}) fcntl$setlease(r0, 0x400, 0x2) 00:42:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="62747266738c", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f5", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000280)=0x4) r1 = open(&(0x7f0000000380)='./file0\x00', 0x28080, 0x118) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) gettid() r3 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002a00)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x3000400}, 0xc, &(0x7f0000002980), 0x0, &(0x7f00000029c0)}, 0x20000080) write$binfmt_misc(r4, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c52177e632a16a28bab5fe80a84a1c5715f"], 0x12) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r5, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xd, 0x0, 0x0, r3, &(0x7f0000000000), 0xfffffce4}]) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x7fffffff, 0x7ff, 0xfffffffffffffffa, 0x5, 0x1, 0x5, 0x100000001, {0x0, @in6={{0xa, 0x4e24, 0x1, @remote, 0x9}}, 0x2, 0x3, 0x25, 0x8}}, &(0x7f00000005c0)=0xb0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x40000000000013, 0x10, 0xe68}, 0x2c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000240)={r6, &(0x7f0000000100), &(0x7f0000000180)}, 0x20) 00:42:50 executing program 5 (fault-call:1 fault-nth:25): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:50 executing program 5 (fault-call:1 fault-nth:26): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:50 executing program 5 (fault-call:1 fault-nth:27): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000280)=0x4) r1 = open(&(0x7f0000000380)='./file0\x00', 0x28080, 0x118) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) gettid() r3 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002a00)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x3000400}, 0xc, &(0x7f0000002980), 0x0, &(0x7f00000029c0)}, 0x20000080) write$binfmt_misc(r4, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c52177e632a16a28bab5fe80a84a1c5715f"], 0x12) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r5, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xd, 0x0, 0x0, r3, &(0x7f0000000000), 0xfffffce4}]) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x7fffffff, 0x7ff, 0xfffffffffffffffa, 0x5, 0x1, 0x5, 0x100000001, {0x0, @in6={{0xa, 0x4e24, 0x1, @remote, 0x9}}, 0x2, 0x3, 0x25, 0x8}}, &(0x7f00000005c0)=0xb0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x40000000000013, 0x10, 0xe68}, 0x2c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000240)={r6, &(0x7f0000000100), &(0x7f0000000180)}, 0x20) 00:42:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:50 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x10000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x220200, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f00000000c0), &(0x7f00000002c0)=0xfffffffffffffeb0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r3, &(0x7f0000000300)={0x10, 0x0, 0x2, 0x400401}, 0xc) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000001c0)={0x0, r0}) fallocate(r2, 0x20, 0x6, 0x1200) r4 = socket$inet6(0xa, 0x3, 0x7) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x10000001) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000340)={0x5, 0x1, 'client1\x00', 0xffffffff80000001, "51a02d462573a9ee", "53aaa95b37484bf8eee39444e6131e7aa91672dc487acb272b6385ccadc74309", 0x6, 0x7}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000200)={@remote={0xfe, 0x80, [0x5702, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x196]}, 0x8, r5}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xfdffffff}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)=ANY=[@ANYBLOB="1cd91400220001000100000000000000a5ce000008000c006885edf0b93dbf89fd1d", @ANYRES32=0x0], 0x1c}}, 0x0) 00:42:50 executing program 5 (fault-call:1 fault-nth:28): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000280)=0x4) r1 = open(&(0x7f0000000380)='./file0\x00', 0x28080, 0x118) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) gettid() r3 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002a00)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x3000400}, 0xc, &(0x7f0000002980), 0x0, &(0x7f00000029c0)}, 0x20000080) write$binfmt_misc(r4, &(0x7f00000004c0)=ANY=[@ANYBLOB="3c52177e632a16a28bab5fe80a84a1c5715f"], 0x12) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r5, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xd, 0x0, 0x0, r3, &(0x7f0000000000), 0xfffffce4}]) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x7fffffff, 0x7ff, 0xfffffffffffffffa, 0x5, 0x1, 0x5, 0x100000001, {0x0, @in6={{0xa, 0x4e24, 0x1, @remote, 0x9}}, 0x2, 0x3, 0x25, 0x8}}, &(0x7f00000005c0)=0xb0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x40000000000013, 0x10, 0xe68}, 0x2c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000240)={r6, &(0x7f0000000100), &(0x7f0000000180)}, 0x20) 00:42:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:51 executing program 5 (fault-call:1 fault-nth:29): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:51 executing program 5 (fault-call:1 fault-nth:30): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:51 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x301, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffff9c}) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xfffffffffffffffa, 0x2000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={r1, 0x80000, r3}) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f0000000100)=0x8000) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000140)=0xfffffffffffffff9, 0x4) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000180)={0x3, 0x100, 0x6, 0x4}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@empty, 0x55, 0x1, 0x3, 0x2, 0x80000001, 0x2}, 0x20) syslog(0x9, &(0x7f0000000200)=""/45, 0x2d) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000240)={'veth1_to_bridge\x00', 0x7}) ioctl$VT_ACTIVATE(r3, 0x5606, 0xd9a7) ioctl$sock_SIOCSIFBR(r3, 0x8941, &(0x7f0000000280)=@generic={0x0, 0x1, 0x2}) r4 = geteuid() syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x7, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380)={[{@nodecompose='nodecompose'}], [{@permit_directio='permit_directio'}, {@uid_lt={'uid<', r4}}, {@hash='hash'}, {@hash='hash'}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/dmmidi#\x00'}}]}) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/checkreqprot\x00', 0x4000, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r5, 0x118, 0x0, &(0x7f0000000440), 0x4) write$FUSE_GETXATTR(r3, &(0x7f0000000480)={0x18, 0x0, 0x3, {0x8}}, 0x18) setsockopt$IP_VS_SO_SET_DEL(r5, 0x0, 0x484, &(0x7f00000004c0)={0x6, @local, 0x4e23, 0x0, 'lblcr\x00', 0x0, 0xc0, 0x3c}, 0x2c) fcntl$getownex(r2, 0x10, &(0x7f0000000500)) shutdown(r3, 0x1) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000540)) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/create\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000005c0)={0x0, 0x7fffffff, 0x800, 0x5, 0x7ff, 0x4}, &(0x7f0000000600)=0x14) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000640)={r6, 0x5}, &(0x7f0000000680)=0x8) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f00000006c0)) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000700)={0x101ff, 0x1, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) getxattr(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)=@known='security.apparmor\x00', &(0x7f00000007c0)=""/91, 0x5b) ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000840)) 00:42:51 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x800, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000d40)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000400000000000000000000000000000000000000000000000400000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000078d5a96d74000000000073797a3100000000000000000000000000000000000000000036fed9b90000000000000000000000000000000000000000000000000000000000000000000000000009000500000000000000000000"], 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x1304dee3) syz_open_dev$amidi(0x0, 0x0, 0xa712b6a4a26e809a) lremovexattr(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000000)=ANY=[]) stat(&(0x7f0000000380)='./file0\x00', 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x20000000001, 0x1) bind$nfc_llcp(r1, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "75b782e4ad88b89d1fc31916080000000788ccfc7f660510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4dbac39877e4ac714b7ecefa8a934a", 0x1}, 0x60) close(r1) syz_init_net_socket$nfc_llcp(0x27, 0x7bd096476a03853d, 0x1) syz_mount_image$minix(0x0, &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100), 0x0, 0x400}], 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x10000, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) modify_ldt$read_default(0x2, 0x0, 0x0) 00:42:51 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x20010010, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:42:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:42:51 executing program 0: openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x6, 0x6) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000000c0)={{0xa, 0x4e21, 0x5, @loopback, 0x81}, {0xa, 0x4e22, 0x100, @loopback, 0x10000}, 0x1, [0x4, 0x1, 0x3ff, 0x1ff, 0x6, 0x7fffffff, 0x8000, 0x8]}, 0x5c) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x7) 00:42:51 executing program 5 (fault-call:1 fault-nth:31): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:52 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000380)="f182ef99a191ca6aa0d953c8b55f270647dd5d91bfbb1a061ecf5e7bd20b1e6ae0d70552ab90de67ad28a1e8cf88860b1b591ff577e888899a101e23b5ba58e1d713ecc7b1efecafdd06f60060e65739644d877fb55391583eb5241403edc0da8f6a84212e4c7ef14f9a96046fb27d057049e028f40a131ce03dfb5dc7a58dd4a089f85a2176de3f4d445160f4fbbd62a871c3922589592b7c191c197c6c823c1bdd9a08bccf8e5f", 0xa8, 0xfffffffffffffff8) keyctl$revoke(0x3, r1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xc, 0x0, &(0x7f0000000040)=[@free_buffer], 0x0, 0x0, 0x0}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) poll(&(0x7f0000000080)=[{r0}, {r0, 0x8301}, {r2}, {r0, 0x9432}], 0x4, 0xec8) r3 = msgget(0x2, 0x2) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000200)=""/242) 00:42:52 executing program 5 (fault-call:1 fault-nth:32): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:52 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000005c0)={@broadcast, @random="dcbf39ce7e84", [], {@ipv6={0x86dd, {0x0, 0x6, "fbf5ae", 0x30, 0xffffff88, 0x0, @ipv4={[], [], @local}, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "81a8bf", 0x0, 0x0, 0x0, @loopback, @loopback}}}}}}}, 0x0) r0 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="74ffcb7253a37b3fc57618a5b5143de8686646387c75aaea17affbc2154b1c73c5e35fe8e9c9f4d67fc7604b99699df6fda3946e718c93d1349d73742e430636b7a3476a1ee73a5e29f42764ef7557f3ee4aa2fd0b99fb9444fa4e4ef5edec8155e61e0217f62961a7d35667d7a0859533d57cc366b993ba65d1099e36b212fc02d2e532b984bad686ae61f770fadbb83e4f2be4e2f1acf1bd7b25d7323fcb1f949a178340e4726cf865af46fc94184f417bb05de3fe5a8fdb21b07ff612c087030c99e67d9194ccad127b60ebd52efa0226669e3b9c236009bbca173cc73a4c299182881ecd4bd33981764dfb34fabf218c46a391189a5e4814faa43511", 0xfe, 0xfffffffffffffffe) r1 = add_key(&(0x7f0000000200)='ceph\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="8fd2ab272d8c3e84caf05a3fd6e82b6ab23bbdc55bd145bf90463884f3c5b8b5fc862bed44df1499d98fbcb361506c495430a141b706c3f0f012c9c4fd951d5115b8897a5d773794d24e1cb92a8d90514fc20cc98284ee3240f06e26d0a536429cf0a824222521a589a64c489485b2abffadcb36c020bdc3f3361aa10f2f858255ce17a3dbfb1792d9c219eb5ea7d8f1bcae4d918645863085ff3987a97c265ad39e460341cb7437ba656775f0549326413c4bac8330c4f03806022d1aa7f884826f062ba5ebd1c736b8cdad41e6cad7568beb7a2a57091bb16e752c88d3a847d61a760c00f74d85630ed5c3654443bb9222836835f44d", 0xf7, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, r1) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/member\x00', 0x2, 0x0) fsetxattr(r2, &(0x7f0000000480)=@random={'user.', '!\x00'}, &(0x7f00000004c0)='\x00', 0x1, 0x3) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dlm-control\x00', 0x20000, 0x0) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f00000003c0), &(0x7f0000000400)=0x8) 00:42:52 executing program 5 (fault-call:1 fault-nth:33): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:42:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:06 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x800, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000d40)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000400000000000000000000000000000000000000000000000400000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000078d5a96d74000000000073797a3100000000000000000000000000000000000000000036fed9b90000000000000000000000000000000000000000000000000000000000000000000000000009000500000000000000000000"], 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x1304dee3) syz_open_dev$amidi(0x0, 0x0, 0xa712b6a4a26e809a) lremovexattr(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000000)=ANY=[]) stat(&(0x7f0000000380)='./file0\x00', 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x20000000001, 0x1) bind$nfc_llcp(r1, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "75b782e4ad88b89d1fc31916080000000788ccfc7f660510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4dbac39877e4ac714b7ecefa8a934a", 0x1}, 0x60) close(r1) syz_init_net_socket$nfc_llcp(0x27, 0x7bd096476a03853d, 0x1) syz_mount_image$minix(0x0, &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100), 0x0, 0x400}], 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x10000, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) modify_ldt$read_default(0x2, 0x0, 0x0) 00:43:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="627472667310", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:06 executing program 5 (fault-call:1 fault-nth:34): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:06 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xff00000000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:43:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:06 executing program 5 (fault-call:1 fault-nth:35): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:06 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="850000000000000000000091d4c8cec46cf7e0317fb0488b0de2ecb3041e2b66e47ea4e9866c3ef24342453719211d8b419d6a5e9331f2373c5058b376f0a03d0976cccf227b824f190ddaa849d6fc55a9e1d68093d52573ebbadd8f9b2872c9c8a8ab1522db0f5beafca8c5d1568dfbd00512543a6226eb19ff30ec8d2a3d0729dcb2544dc837309486eb9011aeba4738dd38a57de14ef13994c023eb2c87bb8ce30465a69482f8262404e0f5a19e917d"], &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x3ff, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0, 0x1200}, 0x28) r1 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000001c0)={0x0, 0x80000}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f00000003c0)={r2, 0x80000, r3}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) 00:43:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:07 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) r2 = accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000100)=0x60, 0x80800) getsockopt$nfc_llcp(r2, 0x118, 0x1, &(0x7f0000000140)=""/126, 0x7e) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2=0xe0000901}}, 0x1c) 00:43:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000180), &(0x7f00000001c0)) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x800) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f00000000c0)={0x100, 0x8}) socket$can_bcm(0x1d, 0x2, 0x2) memfd_create(&(0x7f0000000040)='}eth0\x00', 0x0) 00:43:07 executing program 5 (fault-call:1 fault-nth:36): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fd", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:07 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xfeffffff, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:43:07 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) r0 = socket(0xa, 0x200000000080002, 0x0) r1 = getpid() r2 = getegid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000140)=[{&(0x7f00000000c0)="b9825ffcfba5a593b2816d51becdf9a32e4f8344bbfc39e576048ca929b766ee0363f5ca9e08449b6afa9998081e2c66c4b3d3c5949abc6013d137191aeeeaceccbbab825ba37f825a70d10459319125cf172d98418d282eb56fe2f855aa", 0x5e}, {&(0x7f0000000400)="e6268b511cf32dc481ce5d08d9be22bfd602e18778e210e67dbecbcebeceae799d60fae96d1679980736dde93d00430846ddd37debfc6a7d5e92c37a0f42abd05d419903308cdda20c6673e184bcca0c43fb73e4734b73d48af31ee6ce5832c0e6514691237388b8a967948a065a394b53fb29911b5f4c40f55728b27941304d64043710705502018e615e74494ce141b1d7e21fa7d7fc689ff1936bc5693fb3e61c237ad3718f751aee8c8a0b0e7dc2d9096e3d89a261c19b38e55f6964472f1bb547eb8335364606", 0xc9}, {&(0x7f0000000cc0)="f1f8397ee0addc56a32ad66f33c85d05ffff5de575fb5fd37786706431fd9dfe9993d45438f99dc59ee9b79b7c8e5c46f69cefb9010965d591e6dba5a50f1f01cc77d3fb456975a55ef69b779a7e2307e9af3eb694fc75cd425572ac0ff088937769e3d054acbce5e615dc4bee9432adee4f557d6a6dc9ec7c1be8f7a89c9aed57c196f89995712d8a1c1cef51c7aeabbfbc6147ee91ecad78336e5e0111aeabcad2bdd85568496db627537d5948f8119c4ab0dd18ceb90a55a13a5c95683bc47178d73b2e9a878207488913e9846bf0e64c742a46201fa5bfd419196c0fb3eba637cb2deca27c31be486063e7218cb2ce09ddccc92fa201135ca165e25a5fa300367e9d4a2f508e443a082a3768fa253e457691d8ad5102b99178d3f63754e8cdc8244ef66c7b6fd41e2bd965d653f127f84c57b334f5426b329b3809ce4d293f99ca3e3d45c5610f775ce0314e38d768ba7b37f010087eeaf9609510338742335074f1895a900f89a26944e3280a767d45359e7cd6085f6468704d1cf3ee633f141f6cab03ae5614aad157daa1f244f12f8b7d1e24e68e21b7e09ebdaecf8769e17c374acf196590891aeb1ccce06c79784c5a394f52b78430bf5ab436313612df53f7bbeb4ba507bf1f98ef58e34a061d48357dc79eb70ee4ea96795d66f0acb158b726b90492f032a8a30c8bf68143d8f8b17f33349fa4460109cb7bab930c075531c8f2c1be61609d96bc0a0dd9e43184e3a18140c1e4473b968c96dd447220872869bbcdf9dab6f917c48aa319510c7c0a6b1ae74fe1639445c8f2605fffa4ba256022727fe4ccf33670ef2db68e86c8e6f48431489745be6389762b2acfa1395be5cd67aca9c169945e6e3886419136e9ece92d0796fa079a418026a40951996d98199ca6481b04ecdb7839e4002ece207610d83f3cf0507667faa3bebbc52ad1e694c94584bc2f7b1de1b5b937a8971034c09d5bba02352adba45f57d55d49a007f53438cc607baeefe6e42086675cbe6484d7c7c1efb7c73589463a0c9c15e1cbeef528d42bd33b5d280825ad0ef8474812667cc65e90aab5bb36c05400b14d1ac9a1ebc7f8c45a51c38c47debde56dff81fd165f9bbc32fff7cf7f51bc6db27d2904470a6e5a241bf886c490e64bcd4888618ccdf4cf662777754a511c3a69ade84ca59841c67b6755a42f69dd718455032385db8531d591d0922ded0d24121645137683a070f5cc839c6a704633110837d0203d219460cbb256064f65e02c5668590126c1d36d7094724d9c56a84da28e5b08d9e4540eba29a2797dca6d0c663b72e8b799d081c49fd10b7937fd1be1ee13b33fe5523faea423e809ac99216bc4cf26fd24461852e61bdd9d0bfcc5770f5598a13dae97a2dd4a2335a6d407c113dbec729247926927ce376998193406b27d16e0b4ca90ea2cb07207294643166177f605e14aac779528b039a05bea9c6c80251b8653789183fa9f2731b5a1584b2704d67e33ab8be242d59c9af2ea7a1be1122bf504d48182e83375e99d71864c1b51be7697dcf21df9b92249ceba9ce287f1eb9a4b91f612e9b137be0e397717c284e6791ceee09faa775f72f0c6945607f8bdbe37fc8ba9c80f8af76f9ccdd630aad6373959ea6fcba813cc704b473db83a64bb079c5fd1f471f2577b096f140d40d4cc1bc5fde8e031ff46b162919784092d75fc59f8f0caa1adb292e2e8489bbc75a879b0aee72b65793f96860b98cc662005be8899798b252f367995df14b69eb4a62a8910dbc14a5204c64a189a5318dcc209af8c0ce68afd946900c9d0f701d30f2fe7719fe5e81a9f3a7a03b4bd32f93b0b2651d6edfe0d824163e0d0a54d869635425f76a4810683ef19263013e9f48d466935d11d4f72b17cbdd97044b53efe3161fd8aa896416e30e683edc9e1b04e214d9728de4dbad396e8833dcd4ee9b0f49d55835ac76e1d2c0ebb752d211fa2ac1be6af1efb33cc256def989d116618e353f4126d58f5d5c4b7242e62fe9ea69e60d060b91dc54d351e3493e2507b2b366ef203005d4e64dbd10d929ae9c606a2ad958f15ce3e2459c7a8a50e07aa9e6bc9dd955a3ae8e0c49b19b869d8dd0908456204ed7aca596becee649af328f4722f1d0bc7277bd8841b233a1d8f8208b4e5b3b3553f15c0102d858a820ab1ac44ce4f5e175fc1faaf4aefdc8436e7254fde8b9588ee94b4c0a53fd3dabb5640545e0c6db48b090a48b9723569468b342ed720a99ada27da8bb12d011c857b3c20b090030986e88be6826f56862469088f1b8dadfdafbf88b14748fbe4cfc3fbfb98e3bfd817ed15be33550463e8d53c288620502381f923be8559e37903a0534e37fe2984ba9625b79f89d0abc9066aed65d5dd45e34293464b03408020753682907eca19dc669307d100bc84ceeac7bd2d80dbb4371c5d9d53e8cf178062e2f5824c3f0675402eeaed1daf9dccc5e19af772a5a4e531577c91714a633f0f1762f3b52eac00463ba5b32aa69effae2f91d100117dba7ff7e2f330307bf15c9ecdb2cd94e45586c622a2c50a94b080ae063dbe1900c51253dd97938a98f9df61d5fdc5b6fa022d2b3acb3e0b39fbc015c8eed79892e3c2829f27ce29d41eecb5be3fb3e2f4ecdeee25a34c8019f94885ebacbc778d071a518baf526658593399ef01bb7395174efa02b4fb052edd0ace214d6ed1bde69a2f799f04fa51e97e0a7f87fdc5d12904e93de4b56ccc6e91e7bc83091b79f66c12e3900fcd85e9c837cceaef7d7387517379ca38cd22306f968319b85c17d3b0fd7c8b0fcd0b6e7edf6413b0dba32355486b59c815f136230efddb326a3b3a41659bd986bbc003e4a9348f09e0fe9abbf60fa1bfd34802e5ae7733546f4b714e7c59da460df71a2ae49d83d5016fcc1e5bc8ef86cb1941f8fe4b6342e3622279df8ecb47d3113e4eeb77e4d21953e9a5d6eef650fc627602e8a73801b231c55c9917292fd8ff61f03244e5fa9fc00ebb469ec262ebb95626a19b72f2082109adef1bab2dcf8acba68d533a0bd4d74e02c99c7b8bd69d3f7f83777b9644612acb0f9f4187d6c1841e5e2c2eba235cc7f0e3e8ecd56d40dd1eade29f31979ff804909b6ae5d2f248abb2974d8613a16182529552e696f2eff257535998ec2d330f03bac2c61d9ce52b6a2e67d9917305e96e31d18f72b5e0aaa7668563d45c9d4713cdc53c4219918a7146fb05b724d260f90525aa3185c76ed20e0a6d4fc3412d024113e13ff4bd38683ef5fd6e4bb204564d5996cbdbe2e1e7121e5f8a398b29bcaeb0bf9d4c7c23ed8197a34858a25164cdab7ae59fd720e9e3ea8a77fe854022686040b43c728d65db5c67aeb37800024c41d0ced7ad90810444f777593f059d39cef3dddd15f4f4536806d75da7d0d092e0b5c27f0b79adcb11530b99e9a2df61300524cf7ca154803c3190468f5506dbde4dc1d28199e64c04c64d061e498f0ab615a98b2d93ddec958125847ee62933e7eaffcb3bcd965e54c4141abcb30e02e7b93ef02688e2590ecd2e047c2d12b7b6c8f4faa6b34db89d3897770d34620e35cbe15c34eb2a2f634a35fd618685f7833208b0ab7947f54f167eae91e4438914f2301b4dfe3abdfe87e0d715b4a7cc7ae003706354bc82f7511542fbb081e15d27a1395ac246fac3f902ad8ed4941576c6b0d46f8b21c9b401df839a08ed3d53673ae884815579edca8911b97b50c3283389b62220049930cbb21f01f45adc934ec7e902922e05d9456643779acd8dc09a0d1ed5144058954b68fad7875e9bd9b4c701cef7f1919d2ba7f43fc091d5b22c689bd264488d82ef6355a3296d2f0bb74c22c2b4decc47a3865cc265e7516da1ce00b2ce2e4fdf9ea32f316e02d561b775ca72c920d169299c631c864f898ebe577e6fa9005def522f59d08bcc533f8d89791805df7b72c0945f67f11c4ee3a30cbe7be1ceca61fae92d02f122efdd5524505b5d11947b63b8df30e4799570abe51f0ea5519355ebb513e7186f6993977ce99cce82235b88c51a2c6ae15271d0dc82e40228cb5e97569ff5a1a15a51b8df425fe1d11dcf6b26b1e3930d12e885ec0256568f5fe63d8eca3ebcbd63a5682746ee8a5ffa969f1765245842b4725e2aaacbeaa44d64647ef26d33497e4c5ee68942c396d7fbdea40b4b3b540915be539e21b7dadb1b14292c356128f1156669db283740a5f430a3db56a576afffda8ffab344b823c4befcc6615f9fb6444a7ee4f5a7229655b7fc4bff0100e28a233680441f94322575c28505fbe8808fb28ed31fc3293d8f8099bfaed667aba1005f0a12ff52e342c0c7b3a8f7fbd3648c2f395158cd644c867e68142c2409dadc21601ef2bc6559907d75933fe6614faf9b0ba8f0fe606184f03141f9d025328792239ce986205bf300d34f8e79161e522c106d0e318c159394b7267a99248c59698bbba6d621344d19b796261d220518a13a0190148ee7c714a37ee6883843a9d88b9bab0c564cabe11315a53a9fdb1498856c11e5674767120dc60148c044fc325614638d4ad9db613e133879a87150a7d81f7730c7a6a526e3a7852551259e1c8bfc2dd17170a74fa5cfb08209fec7c3918de24992682a0274612fed5f50516954f835ffb8e2beb1d4d35d9dda975124047735b0325dcc69024697d19aacf84d61386850ac2df2d53ce81c057262ee2322bff1cc9987c91c89188f496975328de1087fa7ad02efb6b0d6170185c150a6932a3ec4268ef5f39afbe3c97420a62e0ab4a84deeb290ddc0bd0d4d0fb3bb00ab287c65f8e0f05268c46cdd5cb92a11a8f13bd89386ffc197a84869767ab1aac5e9cc3b5284ed2d4a9c10bc8dcdea37afdf52246a7a9cdbfcbbee501cd0c09274591dce68df11c60d7ef6f8ab70b7967c8795dc43fe9d0707ae685c9979243e9238e6815cb6ff8c45d2214b612d5e52fe2fafd61705346f649f64e9cab94de50b155b276710880c74fd1164f56728718e7b322faef7e71d6fa8aaad39bd37dbab188f0cfa9686c9fd0f2767b298eaf046bc5211cc4687f89f636f88e60015d37699790d45dcd0cd2ce25ecb054df1e8d76678149058838f7de9b7468db3f41682892b16fd64ff3bb5b2d6fa8ca9f7d1ebb2be71e99b517bf996e4635927ae794dcedee5dd6e4b4f8c9724b9ef1012c613ab7a60a7b9a7a3fb5fc03f42e9e9646300bf9f24190567d6c4cd5244529b11c8b7a53294e20262c08a82720b3d68f5df9fdeb385ee6acd1cf58b1382a362e32e5ddf3e2a5cdfe4159cf70d16fe9cc8048bb921f1d793542d81478de8f3e2affa380e07b5aacfb7226cef43507ace98538e433ebede19d7ee4a289d2d7391d881b621b27413f29b221a37b14009ffaede9f619a761509f4e471f16af236f08ef00fa5d9e5d5f8c5dd3689cfd80340c310bded1ab7716c6aa02588c0ae851ca1cfa36aea7eec2c759ddd6468c9cc108275b9b00a7dba5af8f0add61696df1d480fb788e3f9bb15d30e134fb091decdfc492063f0ceb50553c290677e0f51750fb2b51f8a12cf448738a89d971bdd343485047714e770d531bc8ba829b47476cb6ce3a76da214d0b53dedc6531395f92f3b077bccc08ad69d5ea353f692b26b72a988edcc6516cb2b8b2a439ac73da40e0cabc2d81f1baf48a8817a53c7401045ba3f644ca8f1982bfd76eabd08999da798c673618ca2d71a5333297d103ab27d77a6b3adb85ab91592dc9b446ded0606319f858a9185da00191812e321f7a07c36747ca499131c10a34d", 0x1000}, {&(0x7f0000000500)="167482c6d6900190e5623e97fe81ebfd37563ef2bf94041febe1d10a050e5379fb6b27b62bcbd1fb06f8a073af4159cff23e9ffea7e85e0265d8caa09a5b0fd4cebbc9609ec482797f8513e3367a02497cce13b89b32303755aea5b731194d7e2524eba82bc26467e39d70699774a2e40cc50b9bfd18076c6bff531a73d136dda98bf85497faa4d1a250856814e752fc0b66e4e2fa7865681206cf334207ac1e412cb841886dca3ab16657c2b0e332abd903b7b9860b6a91c7bfaaa868c1bc3cb0a473457adf8966ad586ef0cac82f10a4ab665f3ef908448f0598a4d6a534ba783091", 0xe3}], 0x4, &(0x7f0000000180)=[@cred={0x20, 0x1, 0x2, r1, r5, r2}, @cred={0x20, 0x1, 0x2, r1, r3, r4}], 0x40, 0x40000}, 0x15) sched_setscheduler(r1, 0x5, &(0x7f0000000c80)) setsockopt$inet_buf(r0, 0x11, 0x67, &(0x7f0000000080)="8c4b8e70", 0x4) 00:43:07 executing program 5 (fault-call:1 fault-nth:37): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:07 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) pipe(0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) socket$inet6_dccp(0xa, 0x6, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000100)=0x0, &(0x7f0000000400)) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000600)={{{@in=@dev={0xac, 0x14, 0x14, 0x17}, @in=@loopback, 0x4e22, 0xfff, 0x4e21, 0x0, 0x2, 0x80, 0x80, 0x2f, r2, r3}, {0x6bf, 0xa5, 0x5, 0xbc91, 0x50000, 0x7, 0x4, 0x3}, {0x101, 0x0, 0x1000000010, 0x32}, 0x40, 0x6e6bbc, 0x0, 0x1, 0x3, 0x3}, {{@in, 0x4d6, 0x7f}, 0xa, @in6=@remote, 0x0, 0x2, 0x3, 0xfff, 0x9896, 0x4, 0x9}}, 0xe8) 00:43:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f4", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="62747266730e", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:07 executing program 5 (fault-call:1 fault-nth:38): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:08 executing program 5 (fault-call:1 fault-nth:39): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:08 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x3f00, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:43:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:08 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000000)={0x0, 0x2, [@local, @remote]}) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x210100, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000100)=0x1e) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x39e) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000140)) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f0000000480)={{0xfffffffffffffe01, 0xfffffffffffffff7, 0x35b, 0x6, 0x7, 0x3f}, 0xc6cb, 0x7b, 0x100, 0x4, 0x1, "405a62a39cbdce590795679cb78d0e975392fef6145b78962ca056fc9bcafee964ef784b118b9ed1cad3ed240d1f155457cd9590a94623937d9c58b31db867b74844c69b66c09734ddaf67012118c65d18dd5ded41bbda03170f0d1f72150dbc723c7135b271229a10aff68e6bf9cfc1caba03796f9e6911585bac2444f2a19b"}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r2, &(0x7f0000000240)="1f5be411474934ccea8f28cf30ad948de2adab0afb9a91038a5c005e36d1c3523a745ff572e5fb599513ba0df4ffdec04b3775229cc9131dfb79e83f3c227ffa0a31c4796337eea33674022c0bd4ebaa86d537075edaba12ef06876f1fbdabd0a95192b925edbcccaa42091ae72aeeb5e1e54072cc99ea5fa643a5eb79"}, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r3}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000540)=ANY=[@ANYBLOB="00000000007bc389b883482f3f617c32d5a1cc2b5be031634af9665aa37fcaf14c8c74076fdbaa55bf71ace190439fe701c7ffdf6ce1bc0575b20ea806541a20bc36db4692da504edeff4d6570", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="0000000001000000000000000000000033220fa2e86451e0"], 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x2, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "bff70979622ef4a9"}}, 0x48}}, 0x0) 00:43:08 executing program 5 (fault-call:1 fault-nth:40): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:08 executing program 5 (fault-call:1 fault-nth:41): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x28080, 0x118) syz_open_dev$sg(0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) gettid() r3 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) write$binfmt_misc(r4, &(0x7f0000000740)=ANY=[@ANYBLOB="3c52177e117461958bab5fe80a84a1c5715f045656000000ad7c3e16dcbe8b6164a20e34089cac20ce1490ac757389ea3a74066dbb9a8d9760cc5c35036cf121151311c392a1ae0890d2b9d664fb5e4d9fe55ec7ebcdcbc82a3388a7cf1cc8e55022edefcbadfa645d4b5bbd96629699daa0ead07b05d078f60022a19c267c5201427de3b3ce236224585b9b54a25e91477076ef736869b3945b7c311d0c7c4633bced3f644aae6c402e610b3250251d6f42569d52168ae77aa40668665c44857be57d67c45317d4a612bc09078c0b90c31c"], 0xd2) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r5, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xd, 0x0, 0x0, r3, &(0x7f0000000000), 0xfffffce4}]) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, 0x0, &(0x7f0000000400)) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000600)={0x0}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000680)={r6, 0x1}) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x7fffffff, 0x7ff, 0xfffffffffffffffa, 0x5, 0x1, 0x5, 0x100000001, {0x0, @in6={{0xa, 0x4e24, 0x1, @remote, 0x9}}, 0x2, 0x3, 0x25, 0x8, 0x9}}, &(0x7f00000005c0)=0xb0) setxattr$security_selinux(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000480)='system_u:object_r:man_t:s0\x00', 0x1b, 0x3) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x40000000000013, 0x10, 0xe68}, 0x2c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000240)={r7, &(0x7f0000000100), 0x0}, 0x20) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, 0x0) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000100)=0x2) 00:43:09 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x100000001, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt(r1, 0xff, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_netdev_private(r0, 0x89fb, &(0x7f0000000040)="4221a33147606145b48cbf0465889460409c2990c80fb71d875f302eca9937e31ef92e66f6a8d417a058164b5365295dedff4a76063d288a9cb703b86b608aeda597bc06ce8b8feaa95b8ef1ff80b1315261d6b2790d016bb6ff0660bcad731893a90f1e9ef11d5f657c1511d6f69b3c286db6f15a04fb9c80366bf231b95e42885dcb9904e31eb627f25da199669360c5551604d8a66f2d6393d00c19b7d89cf5e1683e7daf39c3b0252b71eec825f34f5ec3e1a697c5ffc4fb7e51ee6aa7c94d8b3374d8ec652f4a6ed7fe063e469ccef47c3a7dc8c400eaca0dc8956c80971cf92108684d9bb110c4d4ea18b4637e84f89abb800e02c1e4784a461bdcc0a53aee542b8fe58e32543bd02e7b29671efbbe5478d2e66fc78ea850b4a8514017a97026d549500b3aeb238e67a8c3875202e5573624c1e57e7d3d04d0ca2d3b9bb8609c1fd7e5382b00b22016024b903a7872f1b3760fc5373e7082b771075b8dde3a46964d29362b6dae5fb71425dab473f64dabdc6c4a25f5cd19cd9ee58eefcf2763cb4cd29a273dd73206bd2fa3c23200a9dc25a3b5e98a15176ac1afbbeb2e5be5c04afc39edcabc46eec4816e20e0bc7dcfff15e4177317274c89b5253ed1ad4c059d809add0fd21bf066fc261a05bec1e6e5fa8675de41fd42f8d6001156d26debd8e6d91d5c97ee52bb3607cdeda069dc424d3d76a50b910046f9e6c7c97e5ff55fffd9f40d71ec51b6f6861664ac9a36bcd38576341b3aaf9b5ce56c94adccfd7f27008f83c484974683a28ef6a8be8c450cabee2995c977313ce9d9aa187aed260779fb41eefc6fdab156c50d628bf050c5a20f0f9db286f4e1e4d25c1ca33913d85579c3fd75e83f06679c2a07ca0fa60546be8a9ddc29504b08f8aea15c4354b184eb7d0b196c32c8437bef1a9e6a08755c37df418f9d66471d485aef077768b48e5e44180616ea73e00d4c050d5fcd4c67f0ecd01c039b389902caefdb1bc01d7549938829fd4225f24dab889ea609991c1b137ac44caac43eaf78d158c5c904b1ae683ce396a98b36c6666dd6469147133cb02ca3080993d2fdaf55dfe68c7c11ed9bd17c80c86ced36258d60058c24ff9df08bc2dabc5dc0d3a1982073222102cfe50b1a41eee2f9b46110e749c54327eb59918d1903c71abe8818b126d9e1bdbbb3fe7fe22c95bb6dd145d4fafb29c85d738b34184c9b5691b4618e1bd5dff8f74bdfcc2db05b00e091b095761f829fe32113b21d397f1e100c50dc1360b14032e1190585ecd89d0ade06d88005392f022982dce49a6d63fcdb8b3a764f40a05ce9005792e9f68295ba4ca27e872debcccec7d0781e4600be47939b5b880477d49f4b88302875ec0cf8179ab7880b426a17ad55c7e3d014c2750f53ea78a4c05af24680817c4d8770b021ae7d697eed3bc380a6a446657665214b2e2042cb35ddf8f71a678978b4b2b92c25dffb70938405c21e0536eeaabee37192fd8526020e6f0c7c29d7e278c691637e066ea997e110e24e1217eef35086cffbbf309e60848248e3494f0b94075ff1f4f373175763c744ffc6dc135c84ec303a33fad41ed5ce60ddea0ed2b1bb3d4e984aef5b552c13868f678a95c8948d5eae159d201223a8a5abf8a0db0e14b9cadc21200b9f6ac8ab9136c1d6b1482358f3ff877e3470f025f2b695f133705e677c8a3bf250affa9c864c73cdc9dfb25e86b556dca6afca43af0f7e85e22bc612a34161cfc201727c74d97b316e9bae545bee680df6c07631198890264c03dd13795c60d5db9f9b82e4e7c99995e25fb7981631f7dc3254ca9691182672c36a2faafc6da9bb21ae15fab69f237a7ea29448e5fc70ba270d2ec0612b293b554781179b97a2421589345926ed1591f097e928470a1f58001df379f89e4eb45abd5c158d0744db11b02550eddd2108435d3fd781708504f23544c5c732c94981114c35c658fa720f61913b9948cfa553535dc1ba6cf22b3a382dc77d4983492aa575a87358c50b6bb436bfafc0bb9a962c6af0b602ddc75268478ebdcc7d43838df852ef284fdca8fc253d3e52ec82e7d2ec82526933e99b8ec6c936a874ad5b8f47d4a638f6bfc8c37c61e98f9c96ef7ba22603f2a101a41b770161b1193c4ca186d56028970f1f425215b4f6f322278f1789c99c0032c5a0f314cdde4c2f502e02351f431dc4abf92442b4d719e5ba57058a3301e47e5b6d3745232b8c2f73953d4cd1f13edbd2d463f6a3323febb1649a6c903f57fc345b09b6d67475864112466792c6f85b1b80c498bf5d15b4d6a5ec7d57583c22d408cb8dda6691d4c26f821ed3f203090ab5534afbb6dc882cf3a34abbed5a08e21bdeba127cc19537b6d2642f6403d33b1d8640df6b3dd3cff9a035d811b9498db3987f0fba54c3fa88215e64cd5a418f97680e6ad1280130b3c72c4dc44725aa09d9104c1004a8c0366a3772adbf60fd211e2e54cc71083bb93e5d72c64a19686e6e7502c49db14fb958c4460e920bc950acaec337636160a494855cdf5d0800453409aaa52964818f0ca1c5bcedb02c61273f889ba82be2aeb5b88cfceacd8fefa834c13ab944abcdfa47ec02c3e5f0d7e110c1549927ddc7f12cb4dee7ff5103eeeb86c97e43c8c5def6cc661bf798b73ff17f700957e6f9aa5c9989a32bafe61755b1e6d0d91e0550e8ea01145ed1e903812cfee00f7656b8681a43ad2b173876b47524f232cfae0a3fe15d2f7092177505a7280eb22d21df196e4fbc04f12f967fdf2e2097912c0e2d3d1cedcbfab304855c30c29721395fa3cee9d24d76d35c2f40341aaa137ce98e85473756873b4473591cb657fb1ef725a364d8fa982ae99b78d7159badb161b1b537d2b6cd9e2d1d35bd5f34debaaa0ec724d6e47411de6a7b407be6ef59f783aeabbb06042583735c972811376d125e0bf9a6893ff32b5de8fc4803bb2a825bf082bcb3900c5091c35ed0a8bf4ef3fe3a8d04680168d843c1da91e6c8649c51544ced0741a419a3e279eca6d3e04fa793cd98e0978bcc0dcfcba05a86e82fcaa0b74e4f24d428cc2ccacb8b30249084eace7f6fcb082e26acb92d54a5b3a28959591e80007b2e1ae7b510a3966a1b9b7f395a64cc9ccd4b791dae4fc4748971e067aad884b5c855dcf4e2f63d7ea966867a3fc1d3c540dfebed058507a4573295d2f3dc02ca1d57e51dbc479db7c6a47be050197165f557ef1ab2ee0ecd822789a73714171f6bc907b5abe5944ee639c36f81606a651d3cd88a8159bcff180fdc2166657bdc1f493ba442ab9ab6854548f5d1660fde36d083603fe847a1a5840cca59a3aa5d217f2a590584bcf987f4223b9b2421ff825256610f206217123a0dcc99cdb8ad179c7b243cf18a5deaf931b154ee4d76aec3480bde6d35df811464817ec541becb55a877f782083ba1bbc78b84dd3ecd08ea06e60e77582b6c7c86aeb47046ad18f07b46e00b1c96df576741587083ef67b4e365f8d9687561e7019a30f21b0b8d4cbb837595496fd022fb84925abe9b0a793bacce00fc8e6793679ad810aad6466dddccfd7cdbc00c717643fe0b14797f937cd74f8cf6a8f6a802ab50e231e66b9d7ffdcde010ede7f17646ab2844ad9e4af7274d3d11a27c2356b03a7b136feb7a6d9b22a2931ca3e7f9ae6edc38d70c607d564e552884450b8c7f4b58a154518fec3ab73b063ec748e8e5c4f2ce94f9995740f4b3351daa3c2cf4f269c34f1db810b695eeda0c26da5ee3b10ddf971792dcf60b2b4a82e198a5ecb75913d0ea0a5b701c15db473e8d0e0a0abdb86c1cb352f17bb2ac8b97923e833e15ea8f5fcc48d78ecdc64c29a60a8a16b5d91ff1daca0c2ca970b9e834a455499a159c92492ed00cccb9b71df5b59a7ac87ee8195d185bddfb7d783a71d949d3b72ee76737430737fe258d125162e709a418d9fdf3260b21a3307e4966cb95c3fe86439366488c7be6f6114476e15c0f1c7efe31e4bb2e4d9254995ec858211e2fde0d037b3fd91e8abbbb09029e95710e40544ed76873202a47ea4f39baec8a71a7562ff27d399dec0def28c0ebdc98bdbe97ab40aa9f28c609886650ef20fadc12395d004f032588021c576eacad545ccfe18cf642921052eef31c02fbc4482de9ffe052361ea2a5e2d0c7298e7652c73749a16d6b9a5963b680cb4b5767adb51bdaec470c577537ac3380b9cdd9a85f156ce2b62e58f7f1e5d9863672a358cf62f1bb6cfe07fdb7075ab219e5f9439611c360da540c3d41ac3bcc81763360bc87493dc1d40fdde5371f3401fc5e27128537d16e1d527f8f2a910a98ff1658505231c9783907173d3a10d6b0a7230547ededf777cc4165e35b57f94610124e2b280c4bed6730c3960225bb5a4ceb7bddcae8863f270dda1b19224f719c76a61ce586c12ca465effcea535cc57cb8f89fea26e9abcaccc6949504972b6c3cbfc9a329342b3e777f38b3f079dd979a493e89b18454289d40372b7e40ae1fe62868cbba5bf9916434a36e91da15b06aa18104f55f5da98574cb2927db53a8dacff41b88d98ea823d55fa27dc8b4301c5a7b4914744387000bab555670acaebf436bae3224f36cc446d2fd0bb3e51a24b137667a8398630a324839e8f357069d525767fbcebc4b71211889ebc8da8b80f11829a3fd8fb24fc28970cfb172853b7311a2e5041a45ab2045db5337142315cc326f430b948466b187f622447a06f1be1ae47f362547d90d1e9b784cafe18bdacc1341696349452c410f3c9695a320a3aac4321fca465f0c00a82b73b159a61bbff5e279e837c508207b33ba275a3fb67ee27e8d323845b2bca5da7a79877b593ec8d50eef598b0ad3d212b9d2ffb5ca274b8c2cc32e4727fbf23481de4491f568bc1a92c36db18f7b8dbdca94023bdb49d834e7dd97477282ba52e8c73041978e8bc6c9832dd1e9dee809ceb8d42af86db5a615c347ad890dc7acc51c59031c124c3a2966857c1634c51a0eafa963519a3746cdbab705b01418001182ce58648aa008693956a5d4d8995536204239350df215ea09e727876ebdf0897f4c2d9b897d859b32723d9c051f628aaab87be42f232bb00a9b821db8e2a93c2a734987cfde445a8b31841aba5a67f9c3e24148611651033e73272a6460443e93f3cb3229e296a03d1cc6ef3691b2c473c8b1f66ef0bf5bb3ef4f03423051e4624b6086a46cdaf55a739d290d149f208b8bd6a6824a13c375201c220cf88d6c06be7a939510d2cb54d10962411e42a51d55eaaddaef7d4637295dae79cfe983464cfadbc66fc1e0b1aa5ddb0886527e5403f00b3bb7c0f207fbad0a9ccf61e665531d69821e39fb3d6187e4b48b075be403826be8cca834bacbba2085c69f2fbe194be5569097a476402cd1da3cf354ba5c9e4d80127a97115d2c0477566209663c9db57f216759720af2d3dcc52d9d373f909949bca17808f6b90f9a11d247a4ce69b34ba9a7c41414cdca57a0d60142c8c6a0efcaad00a6fc539da4a522428444d459710513e0b58e35b19b3311b7c3ce67dcd50ee6b0e5e83d0ccb8ac9c7e88895e366b2fb53e01aa0d7f96575ccea53097b6a24a3003c3381bcc586614e011765a3bac4b3770cba4c5d31498f231026622557c7309d12b3de090b6d92f4fec370a9a3bd69667efc327d29ad8a11de860378bd44fdf418f75c1a81e200cb05d05d2ed310c6b04b920581dcaf8834e51b1e45b40f4bfd29848983d7e80ce69f75f8eb27025f6ca26c5a36ad42903431faf594bd8a78743cbdb3ae8b2d") 00:43:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:09 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x6, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:43:09 executing program 5 (fault-call:1 fault-nth:42): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) pipe(&(0x7f0000000000)) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xfffffef4}], 0x1, &(0x7f0000000080)}, 0x0) 00:43:09 executing program 5 (fault-call:1 fault-nth:43): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:09 executing program 5 (fault-call:1 fault-nth:44): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:10 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f00000000c0)={0x0, r3/1000+10000}, 0xfffffffffffffd26) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x19}}, 0x1c) r4 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x80000001, 0x400101) getsockopt$XDP_STATISTICS(r4, 0x11b, 0x7, &(0x7f00000001c0), &(0x7f0000000200)=0x18) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @multicast1, @multicast2}, 0xc) ioctl$TIOCSSOFTCAR(r4, 0x541a, &(0x7f00000003c0)=0x40) listen(r2, 0x0) bind$alg(r4, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-avx2\x00'}, 0x58) socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r2, &(0x7f0000000000)=@xdp, &(0x7f0000000180)=0x80, 0x0) shutdown(r2, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000400)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000440), 0x4) r6 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x4000) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0xfffffffffffffffd, 0x0) readv(r7, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x48) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000540)) openat$cgroup(r8, &(0x7f0000000340)='b}z1\x00', 0x200002, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000580)) ioctl$RTC_RD_TIME(r8, 0x80247009, &(0x7f0000000480)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000180)) 00:43:10 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xfffffff5, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:43:10 executing program 5 (fault-call:1 fault-nth:45): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:10 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x7fff, 0x100) ioctl$NBD_CLEAR_QUE(r0, 0xab05) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/3, 0x3}], 0x1, 0x0) 00:43:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fe", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:10 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000, 0x6) write$P9_RWALK(r0, &(0x7f00000000c0)={0x3d, 0x6f, 0x1, {0x4, [{0x8, 0x3, 0x3}, {0x4, 0x3, 0x2}, {0x2, 0x3, 0x7}, {0x4, 0x3, 0x6}]}}, 0x3d) recvmmsg(0xffffffffffffffff, &(0x7f00000088c0)=[{{0x0, 0x0, &(0x7f0000002ac0)=[{&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f00000038c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000003500)=[{&(0x7f00000058c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x50}, {0x6, 0x0, 0x0, 0x1}]}, 0x10) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x1ba, &(0x7f00000022c0)}}, {{0x0, 0x0, &(0x7f00000026c0), 0x0, &(0x7f0000002700)}}], 0x75a, 0x0) 00:43:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="62747266730f", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:10 executing program 5 (fault-call:1 fault-nth:46): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs"', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs,', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:11 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f00000000c0)={0x0, r3/1000+10000}, 0xfffffffffffffd26) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x19}}, 0x1c) r4 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x80000001, 0x400101) getsockopt$XDP_STATISTICS(r4, 0x11b, 0x7, &(0x7f00000001c0), &(0x7f0000000200)=0x18) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @multicast1, @multicast2}, 0xc) ioctl$TIOCSSOFTCAR(r4, 0x541a, &(0x7f00000003c0)=0x40) listen(r2, 0x0) bind$alg(r4, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-avx2\x00'}, 0x58) socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r2, &(0x7f0000000000)=@xdp, &(0x7f0000000180)=0x80, 0x0) shutdown(r2, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000400)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000440), 0x4) r6 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x4000) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0xfffffffffffffffd, 0x0) readv(r7, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x48) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000540)) openat$cgroup(r8, &(0x7f0000000340)='b}z1\x00', 0x200002, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000580)) ioctl$RTC_RD_TIME(r8, 0x80247009, &(0x7f0000000480)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000180)) 00:43:11 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xf401, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:43:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x8, 0x880) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f00000000c0)=0x8000) syz_emit_ethernet(0x2f095c, &(0x7f0000000000)={@remote, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) socket$l2tp(0x18, 0x1, 0x1) 00:43:11 executing program 5 (fault-call:1 fault-nth:47): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="627472667305", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f00000000c0)={0x0, r3/1000+10000}, 0xfffffffffffffd26) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x19}}, 0x1c) r4 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x80000001, 0x400101) getsockopt$XDP_STATISTICS(r4, 0x11b, 0x7, &(0x7f00000001c0), &(0x7f0000000200)=0x18) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @multicast1, @multicast2}, 0xc) ioctl$TIOCSSOFTCAR(r4, 0x541a, &(0x7f00000003c0)=0x40) listen(r2, 0x0) bind$alg(r4, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-avx2\x00'}, 0x58) socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r2, &(0x7f0000000000)=@xdp, &(0x7f0000000180)=0x80, 0x0) shutdown(r2, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000400)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000440), 0x4) r6 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x4000) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0xfffffffffffffffd, 0x0) readv(r7, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x48) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000540)) openat$cgroup(r8, &(0x7f0000000340)='b}z1\x00', 0x200002, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000580)) ioctl$RTC_RD_TIME(r8, 0x80247009, &(0x7f0000000480)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000180)) 00:43:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:11 executing program 5 (fault-call:1 fault-nth:48): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:11 executing program 5 (fault-call:1 fault-nth:49): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:12 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xfffffffe, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:43:12 executing program 5 (fault-call:1 fault-nth:50): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f00000000c0)={0x0, r3/1000+10000}, 0xfffffffffffffd26) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x19}}, 0x1c) r4 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x80000001, 0x400101) getsockopt$XDP_STATISTICS(r4, 0x11b, 0x7, &(0x7f00000001c0), &(0x7f0000000200)=0x18) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @multicast1, @multicast2}, 0xc) ioctl$TIOCSSOFTCAR(r4, 0x541a, &(0x7f00000003c0)=0x40) listen(r2, 0x0) bind$alg(r4, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-avx2\x00'}, 0x58) socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r2, &(0x7f0000000000)=@xdp, &(0x7f0000000180)=0x80, 0x0) shutdown(r2, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000400)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000440), 0x4) r6 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmat(r6, &(0x7f0000ffc000/0x2000)=nil, 0x4000) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0xfffffffffffffffd, 0x0) readv(r7, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x48) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000540)) openat$cgroup(r8, &(0x7f0000000340)='b}z1\x00', 0x200002, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000580)) ioctl$RTC_RD_TIME(r8, 0x80247009, &(0x7f0000000480)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000180)) 00:43:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="627472667306", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:12 executing program 5 (fault-call:1 fault-nth:51): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:12 executing program 5 (fault-call:1 fault-nth:52): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="627472667382", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:13 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xfe80000000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:43:13 executing program 5 (fault-call:1 fault-nth:53): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="627472667304", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="627472667302", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:13 executing program 2: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000140)={0x0, 0x401, 0x7851, &(0x7f0000000100)=0x4}) r1 = eventfd2(0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 00:43:13 executing program 0: mlockall(0x2) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000084000000060000ffffffeb0000000000"], 0x18}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 00:43:13 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000002c0)={0x13, 0xffe7, 0xfa00, {&(0x7f00000003c0), r2, 0x1}}, 0x18) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000340)="5500000018007f5300fe01b2a4a280930a06000000a84308910000003900090008000c00010000001900150006000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab6513", 0x55}], 0x1}, 0x0) dup2(r1, r1) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000300)={0x8001005, 0x200}) 00:43:13 executing program 5 (fault-call:1 fault-nth:54): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:13 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3}) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x9d0000, 0x1, 0x6, [], &(0x7f0000000000)={0x990a95, 0x1, [], @value64=0xeb}}) 00:43:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="62747266737f", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:13 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xf78, 0x400100080400) ioctl(r0, 0xffffffffffffffb8, &(0x7f0000000600)="40446f0663e4") 00:43:14 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xc8050000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:43:14 executing program 0: r0 = socket(0xc, 0x400000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="d98fa4f5407b"}, 0x14) r2 = socket$inet6(0xa, 0xa, 0x5) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmmsg$inet_sctp(r0, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x8847, 0x8, @empty={[0xeffdffff00000000]}}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492465, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000080)=""/76, &(0x7f0000000100)=0x4c) 00:43:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:14 executing program 2: r0 = socket$inet(0x10, 0x80800, 0xf) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000080)="24000000100007031dfffd946fa2830020200a0009000300001d85687f0000000400ff7e280000000b0a43ba5d8060000000060000000029ec2400020cd37ed01cc0730ec279b2fcbf4042d1", 0x4c}], 0x1}, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) 00:43:14 executing program 5 (fault-call:1 fault-nth:55): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:14 executing program 2: socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000240)='hybla\x00', 0x6) r2 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x5, 0x103000) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) getpgrp(0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, &(0x7f00000000c0)={0xfffffffffffff801, 0x41495043, 0x3, @stepwise={0x5, 0x1, 0x0, 0x8001, 0x100000001, 0x1000}}) 00:43:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x12d) 00:43:14 executing program 5 (fault-call:1 fault-nth:56): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000300)=0x3) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x23c289b8, 0x100, 0x200, 0xfffffffffffffffc, 0xfffffffffffffffa}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1, 0x10001}, 0x8) 00:43:14 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r1, r1) socketpair(0xd, 0x4, 0x3280000000000000, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000280), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000580), 0xc, &(0x7f0000000180)={&(0x7f0000000600)=@migrate={0x50, 0x21, 0x1, 0x0, 0x0, {{@in=@local, @in=@multicast2}}}, 0x50}, 0x8}, 0x0) 00:43:15 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:43:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:15 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000500)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x3, &(0x7f0000000080)) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x800) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000180)=0x10000, 0x4) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="0673322e00067b85050010002d4ed891d0aa000df673ab8e52931f9195b6f837f6668898778be872e6d1906fc1f440b953288b8f3dcaa7b3e1d4b52cdd1f3adf8182bb179fa3fc8f0e0f6e1bf095b4844abb4b7ef3e4212e2b3671389104d2361dca06d5748065c262ee024ae511d290de9f10e7acea7380965715c2d7ef0872fdb195ecbd7bf3c2e2e8e904bde9b55995c4530ea13a109bb4d9057efb169bb1f49ba65b6f4f5e9c7c87af1b3e15274cb7ca38da24881370b4a1470283383d6b1e4914dccee619825de22ca3090ee08ef5e4f3dec6f5c2d8af6939cb6194933d2bbe127d06e36a2e8a2b3b34aff275ae55409636a114717edfdf4ef5bdc3c40f07183f738e65915b2702f5eb9b1c2a42ad4ed52a6b37140d44128b5476bb50a96ed97f5a2d23b2c5166e698c323221ddcfec558240af6baa860247ee6162319ad46fa500f231d88bdcaf7e7aba521ca2afd8838481d4b47a7c7dbde79518a1e16866bbd1511d338cc247332ef000fb1536dceb9d391f1170"]) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x2000, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000240)=0x1) 00:43:15 executing program 2: r0 = socket$inet(0x2, 0x2, 0x2000000088) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x80000001, 0x101800) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000180)={r2, &(0x7f0000000140)=""/43}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x20000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) sendto$inet(r0, 0x0, 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x4) sendto$inet(r4, &(0x7f00000001c0)="dde25fa74a4efa9bb058f7e95ad2a3ceb954bf7b28df4f7b25", 0x19, 0x0, 0x0, 0xc) 00:43:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:15 executing program 5 (fault-call:1 fault-nth:57): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:15 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"6272696467653000000000000000f1ff", 0x1010}) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setgroups(0x40000000000001a3, &(0x7f00000001c0)=[0x0]) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={"766574000000000000000000bd6800", 0x43732e5398416f1b}) 00:43:15 executing program 0: r0 = socket(0xa, 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x8000) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0x1006}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x3, @dev={0xfe, 0x80, [], 0x18}, 0x2}, r2}}, 0x30) sync() r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r3, 0xffffffffffffff7f) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r4, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x0) r5 = accept4(r3, 0x0, &(0x7f00000003c0), 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r5, 0x84, 0x6c, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)=0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x1, 0x1b0, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x20000320], 0x0, &(0x7f0000000040), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'rose0\x00', 'eql\x00', 'syzkaller0\x00', 'ifb0\x00', @dev, [], @empty, [], 0xf0, 0xf0, 0x120, [@devgroup={'devgroup\x00', 0x18, {{0x3}}}, @devgroup={'devgroup\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x228) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000c40)={0x6, 0x118, 0xfa00, {{0x9, 0x4, "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", 0x12, 0x2, 0x7, 0x9, 0x8, 0xffffffff, 0x4}, r2}}, 0x120) 00:43:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:15 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000280)=0x2fe, 0x4) modify_ldt$read(0x0, &(0x7f00000003c0)=""/132, 0x84) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f0000000480)=""/222) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x5) sendto$inet(r1, &(0x7f0000000cc0), 0x0, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x0, 0x2]}, 0x10) unlink(&(0x7f0000000c80)='./file0\x00') accept4$llc(r0, 0x0, &(0x7f0000000240), 0x80800) shutdown(r1, 0x1) getsockopt(r0, 0x400, 0x3f, &(0x7f00000002c0)=""/252, &(0x7f0000000180)=0xfc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x800) io_setup(0xff, &(0x7f00000001c0)) r3 = syz_open_dev$vivid(&(0x7f00000000c0)='/dev/video#\x00', 0x2, 0x2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x620, 0x0, 0x348, 0x348, 0x128, 0x348, 0x588, 0x588, 0x588, 0x588, 0x588, 0x4, &(0x7f0000000580), {[{{@ip={@empty, @local, 0xffffffff, 0xffffffff, 'syzkaller0\x00', 'veth1_to_team\x00', {0xff}, {0xff}, 0x89, 0x3, 0x4a}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x24, 0x20, 0x1, 0x1}}, @common=@unspec=@devgroup={0x38, 'devgroup\x00', 0x0, {0x1, 0x100, 0x340, 0x1, 0x8}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0xe}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @local, 0xffffff00, 0xffffffff, 'team_slave_1\x00', 'ip6tnl0\x00', {}, {0xff}, 0x6, 0x1, 0x2}, 0x0, 0x1f8, 0x220, 0x0, {}, [@common=@unspec=@comment={0x120, 'comment\x00'}, @common=@set={0x40, 'set\x00', 0x0, {{0x8, [0x3, 0x4, 0x1, 0x7, 0x1800000, 0x8ce7], 0x10001, 0x1a8, 0x8000}}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@uncond, 0x0, 0x218, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={0x150, 'hashlimit\x00', 0x2, {'\x00', {0x4, 0xffffffffffffff0a, 0x20, 0x6, 0x100000001, 0x3, 0x3, 0xa0}, 0x7}}, @common=@ah={0x30, 'ah\x00', 0x0, {0x3ff, 0xff, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000c40)={0xffffffffffffffff, 0x40, 0x6, 0x50f}, 0x8) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6e6f696b658c0700a11605000012000046"]) 00:43:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:15 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xfec00000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:43:15 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000140)="e86528cf7443658404f499caa13a39deecba08e4e8258c56ac17e057621c803f0f547710c1817b0e7b954907a06bfad6406ca728335caac3398c6edc7b6b652d01504cbc5c3ba4eae1813288ace523b39cf647229fcb0e85322b9778b8b5817bb3ea8605f0886af4421ac2be8cd1e0bbaddd838deef5bebd45f4d13a904a59f206d30417b886fb7cc187a8f32540e6d2591002c143d1b60384ec55221975d7f37b37231aae543025c006c3c5d9842e3c173cd1c44e1845f7e6bac2b607b52b24eef450da2e9cd58d684f638aaad0116446b5c6587726") setsockopt$inet6_int(r1, 0x29, 0xdf, &(0x7f0000000000), 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000340)={0x1, 0x0, {0x2, 0x4, 0x2}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}) 00:43:15 executing program 5 (fault-call:1 fault-nth:58): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:15 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9841, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x2, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000004c0)=0x100000035) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x18000, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0xf36f) r2 = geteuid() stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000580)=0xe8) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', &(0x7f0000000380)='./file0//ile0\x00', &(0x7f00000003c0)='fuseblk\x00', 0x1000080, &(0x7f00000008c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030304e3030303030303030473030304830303030302c75732fa8f9844a7c", @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',blksize=0x0000000000000800,max_read=0xffffffffffffffff,allow_other,allow_other,default_permissions,max_read=0x0000000000000001,blksize=0x0000000000000800,allow_other,blksize=0x0000000000000400,blksize=0x0000000000000200,subj_type=/dev/sequencer\x00,subj_user=/dev/sequencer\x00,uid=', @ANYRESDEC=r4, @ANYBLOB=',\x00']) syz_genetlink_get_family_id$fou(&(0x7f0000000ac0)='fou\x00') r5 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x4) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000400)=0xe000000, 0x4) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000006c0)={{0xa, 0x4e24, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x3ff, @mcast1, 0x1000000}, 0x4, [0xb, 0x4, 0x0, 0x0, 0x0, 0x80000001]}, 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000280)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000640)={0x80000000000004, 0x0, 0x3ff, {}, 0xfffffffffffffffe, 0x8}) setsockopt$inet6_dccp_int(r6, 0x21, 0x7, &(0x7f0000000a80)=0x3f, 0x4) rmdir(&(0x7f0000000340)='./file0//ile0\x00') syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x10000005, 0x40200) 00:43:16 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000280)=0x2fe, 0x4) modify_ldt$read(0x0, &(0x7f00000003c0)=""/132, 0x84) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f0000000480)=""/222) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x5) sendto$inet(r1, &(0x7f0000000cc0), 0x0, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x0, 0x2]}, 0x10) unlink(&(0x7f0000000c80)='./file0\x00') accept4$llc(r0, 0x0, &(0x7f0000000240), 0x80800) shutdown(r1, 0x1) getsockopt(r0, 0x400, 0x3f, &(0x7f00000002c0)=""/252, &(0x7f0000000180)=0xfc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x800) io_setup(0xff, &(0x7f00000001c0)) r3 = syz_open_dev$vivid(&(0x7f00000000c0)='/dev/video#\x00', 0x2, 0x2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x620, 0x0, 0x348, 0x348, 0x128, 0x348, 0x588, 0x588, 0x588, 0x588, 0x588, 0x4, &(0x7f0000000580), {[{{@ip={@empty, @local, 0xffffffff, 0xffffffff, 'syzkaller0\x00', 'veth1_to_team\x00', {0xff}, {0xff}, 0x89, 0x3, 0x4a}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x24, 0x20, 0x1, 0x1}}, @common=@unspec=@devgroup={0x38, 'devgroup\x00', 0x0, {0x1, 0x100, 0x340, 0x1, 0x8}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0xe}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @local, 0xffffff00, 0xffffffff, 'team_slave_1\x00', 'ip6tnl0\x00', {}, {0xff}, 0x6, 0x1, 0x2}, 0x0, 0x1f8, 0x220, 0x0, {}, [@common=@unspec=@comment={0x120, 'comment\x00'}, @common=@set={0x40, 'set\x00', 0x0, {{0x8, [0x3, 0x4, 0x1, 0x7, 0x1800000, 0x8ce7], 0x10001, 0x1a8, 0x8000}}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@uncond, 0x0, 0x218, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={0x150, 'hashlimit\x00', 0x2, {'\x00', {0x4, 0xffffffffffffff0a, 0x20, 0x6, 0x100000001, 0x3, 0x3, 0xa0}, 0x7}}, @common=@ah={0x30, 'ah\x00', 0x0, {0x3ff, 0xff, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x680) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000c40)={0xffffffffffffffff, 0x40, 0x6, 0x50f}, 0x8) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6e6f696b658c0700a11605000012000046"]) 00:43:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="627472667305", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:16 executing program 5 (fault-call:1 fault-nth:59): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:16 executing program 0: clone(0x2102005ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, 0x0) exit(0x0) socket$key(0xf, 0x3, 0x2) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000640)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x88) stat(0x0, 0x0) getgroups(0x0, &(0x7f0000000580)) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x6, @local, 'bridge0\x00'}}, 0x1e) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000280)={0xa99f}, 0x4) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000180)={0x0, 0xb5, "481781f9079c96086d4cf7621fb0ef58afa268f3deb31f0da0c8611d1e2c48b7110df2766dc06322ff0acccb3b8a80f65d8c28f71a3819c3c462de966235bfa2c08acedf191c9cc0d9761ea627497788cf44ae37abd726583e48afdcfc99ab6613fbbd538686b5888a523f05236734c0b20b46f901c21b131f67c31d395bbc65db2c90fb671815d5c4bfeb7b21aba87a2dda2c49ba504902b3f1b41369d72a80e481041684fc5f3ba5e06f9327d8075bdde7276e7b"}, &(0x7f00000000c0)=0xbd) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r2}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x20b, 0x6, 0xdc, 0xa3, 0x1, 0x0, 0x0}, &(0x7f0000000040)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={r3, 0x6, 0x30}, 0xc) 00:43:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) r2 = getpgid(r1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="643a4ae376a09e07b4daa1bc96629ead4de3766138e4f5de1cfe639cf6efbcb33378b267180b13d06e1d3b5da87d9a89b9cf4a3dfc52c0d7eb0013e5fe922426d10e3821", 0x44) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r2, r0, 0x0, 0x0, 0x0}, 0x30) 00:43:16 executing program 5 (fault-call:1 fault-nth:60): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:16 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xff00, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:43:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="62747266730f", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:16 executing program 2: socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'lo\x00\x00\x00\x00\x00\x00\x00`\x00'}) signalfd4(r1, &(0x7f0000000000)={0x9}, 0x8, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) 00:43:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:16 executing program 5 (fault-call:1 fault-nth:61): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:17 executing program 5 (fault-call:1 fault-nth:62): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:17 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000014c0)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000001a00)={0xffffffff, 0x2, 0x206, 0x8, 0x3, 0x0, 0xfffffffffffffffc, 0x6, 0x0}, &(0x7f0000001a40)=0x20) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000001a80)={r1, 0x4}, &(0x7f0000001ac0)=0x8) bind$alg(r0, &(0x7f00000016c0)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(aes)\x00'}, 0x1d) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005", 0x5) accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001480)='/dev/mixer\x00', 0x900, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001680)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000001740)='ns\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(r5, 0x0, 0x2e, &(0x7f0000000280)={0x3, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e20}}}, 0x108) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r6, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x1e, &(0x7f0000000000), 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r6, 0x84, 0x1e, &(0x7f0000000040), 0x102e2) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000001640)='/dev/cuse\x00', 0x2, 0x0) fsetxattr$security_ima(r8, &(0x7f00000000c0)='security.ima\x00', &(0x7f00000003c0)=@md5={0x1, "b5d98a8b72555cf9c4e220bdfc44d317"}, 0x11, 0x2) socket$packet(0x11, 0x10000000000003, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0xf4) timer_create(0x0, &(0x7f0000000180)={0x0, 0x20, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f0000044000)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000400)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000440)={0x10000, 0xff, r10, 0x8, r11, 0x100200000, 0x5}) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000157, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000040)={0x0, 0x5, 0x0, 0xf7, &(0x7f0000000180)=""/247, 0x1000, &(0x7f0000000480)=""/4096, 0x6c, &(0x7f00000002c0)=""/108}) 00:43:17 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x8, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:43:17 executing program 5 (fault-call:1 fault-nth:63): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:17 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl(r0, 0xffffffff, &(0x7f0000000080)="0b912a4a5a4527a2c1933c2e1cda0fbca7e54d782a5f8573966389ba4c5eee7257fa521a") pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_context(r1, &(0x7f0000000100)='system_u:object_r:dhcpd_unit_file_t:s0\x00', 0x27) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$uinput_user_dev(r1, &(0x7f0000000140)={'syz0\x00', {0x80, 0xff, 0x7fff, 0xb7}, 0x2a, [0x9, 0x2, 0x5, 0x5f, 0x26, 0x11a, 0xc855, 0x8, 0x1, 0x100, 0x1, 0xe5c, 0x10000, 0xfff, 0x6, 0x400, 0xffffffff, 0x3, 0xeb34, 0x1051, 0x4, 0x8, 0x20, 0x100, 0x7, 0x10000, 0x7fff, 0x1, 0x8c, 0xfffffffffffffffc, 0x5, 0x100, 0x10001, 0x4, 0x3, 0xec7b, 0x20, 0x3, 0x4, 0x3, 0x7, 0x0, 0x8f, 0xd8, 0xa45, 0x7, 0x20, 0xcba2, 0x7fff, 0x1, 0x512c, 0x2, 0x6, 0x1, 0x6, 0x84, 0x63, 0x0, 0x9, 0x6562, 0x5, 0x2, 0x7, 0x6], [0x7fffffff, 0x87cc, 0x7, 0x4, 0x0, 0x7fffffff, 0x0, 0x30000000, 0x9, 0xfffffffffffffffe, 0x7, 0x8, 0xffffffff80000001, 0x4, 0x6, 0xe99b, 0x8, 0x0, 0x0, 0x8000000000000, 0x7fff, 0x5, 0x5, 0x7, 0x8000, 0x5, 0x40, 0x1f, 0x0, 0x650, 0x5, 0x3, 0x0, 0xcca, 0x1, 0x3ff, 0x1ff, 0x5, 0x4, 0x2, 0x4000000, 0xc0a1, 0xcfc, 0x2, 0x0, 0x3, 0x2, 0x55, 0xfff, 0x5, 0xdc18, 0x40, 0x7fffffff, 0x2, 0x8a, 0x7fffffff, 0x9, 0x1, 0x2505, 0x6, 0x101, 0x2, 0xfff, 0x200], [0x800, 0x1, 0x0, 0x1f, 0x2, 0xbca, 0x8, 0x8001, 0x267, 0x9, 0x5, 0x3, 0xca6, 0xfffffffffffffc00, 0x4, 0xffffffff, 0x5, 0x6, 0x7, 0x7, 0xd926, 0xb36, 0x0, 0x5, 0x78, 0x1, 0xff, 0x9, 0x6, 0x116a, 0x5, 0x3, 0x8, 0xe70, 0x400, 0x3, 0x3, 0xfff, 0x5, 0x5, 0x9, 0x9, 0x3, 0x2, 0xffffffff, 0x7, 0x7, 0x6, 0x4, 0x0, 0xb9, 0x30, 0x2, 0xff, 0x7, 0x4, 0x0, 0x1000, 0x7, 0x8, 0x400, 0x1f, 0x9, 0x9], [0x1, 0x7, 0x3, 0x7, 0x4, 0xc2b, 0x3a53, 0xffffffff, 0x1ff, 0x9, 0x7f, 0x800, 0x1ff, 0x5, 0x74, 0x7, 0x3197, 0x0, 0xfffffffffffffff8, 0x9, 0x10001, 0x3, 0xff, 0xbb, 0x5, 0x101, 0x0, 0x3, 0x1000, 0x1, 0x3, 0x5, 0x5, 0xb4e, 0x6, 0x1, 0xcd61, 0x8, 0xfc00000000000000, 0x3, 0x8, 0xc95, 0x81, 0x9, 0x4, 0x8, 0x100, 0x3, 0x2, 0xbb, 0x7ff, 0x7ff, 0x8, 0x1, 0x1, 0x3, 0x6f, 0x7, 0x9b85, 0x2, 0x0, 0x0, 0x9, 0x3ff800000000]}, 0x45c) 00:43:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x5000001, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa, 0x800000041}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, &(0x7f0000000200)=0x98) close(r2) close(r1) 00:43:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:18 executing program 5 (fault-call:1 fault-nth:64): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0x4, 0x91e1, 0x5, 0x4, 0x0, 0x70bd2b, 0x25dfdbfe, [@sadb_sa={0x2, 0x1, 0x4d5, 0x2d2, 0x1, 0xf1, 0x1, 0xe0000000}]}, 0x20}}, 0x814) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f0000000100)) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a7c2d023c126285718070") syz_read_part_table(0x8d000000, 0x1, &(0x7f0000000300)=[{&(0x7f0000000340)="0be5a941", 0x4}]) 00:43:18 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffffe, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x640000, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x2, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x40ffff) 00:43:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:18 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xf401000000000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:43:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:18 executing program 0: r0 = socket$inet(0x2, 0x840000000003, 0x2) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0xfffffffffffffffc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x20000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)}) setsockopt$inet6_int(r6, 0x29, 0x33, &(0x7f0000000440), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r5, 0x0, 0x2, &(0x7f0000000240)='%\x00'}, 0x30) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x100000001, 0x3, 0x47df, 0x1, 0x0, 0x0, 0x38040, 0x2, 0x3, 0x2, 0x10000, 0x6, 0x800, 0x800, 0x0, 0x0, 0x0, 0x9991, 0x1, 0x600000000000, 0xffffffffffff4017, 0x7, 0xdc6, 0x1, 0x5a, 0x6, 0x4, 0x0, 0x9, 0x3808, 0xc86, 0xffffffffffffdcca, 0x8, 0x0, 0x101, 0x9, 0x0, 0x0, 0x3, @perf_config_ext={0x7, 0x7f}, 0x400, 0x3ff, 0x9, 0x3, 0x7, 0x0, 0x5}, r7, 0xf, r2, 0xa) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x1129, 0x26000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000180)={0x1, r7}) ioctl$EXT4_IOC_MIGRATE(r6, 0x6609) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x6, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x200000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r3, 0xc008ae05, &(0x7f0000000480)=""/119) read(r6, &(0x7f0000002380)=""/4096, 0x1000) setrlimit(0x0, &(0x7f00000000c0)={0x10001}) ftruncate(0xffffffffffffffff, 0x80080) close(r2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$inet_int(r0, 0x0, 0x40000000000c9, &(0x7f00000000c0), 0xb8966883623f14be) 00:43:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:18 executing program 5 (fault-call:1 fault-nth:65): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:19 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="4800f4004e"], 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="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", 0x121) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) r2 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x6, 0x80040) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/member\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000180)={0x2000}) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r0, r1}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f00000003c0)={{0x87, @rand_addr=0x100, 0x4e22, 0x1, 'sh\x00', 0x24, 0x4, 0x6a}, {@multicast1, 0x4e22, 0x5d5c0040f54bc2d6, 0x0, 0x5, 0x6}}, 0x44) 00:43:19 executing program 5 (fault-call:1 fault-nth:66): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:19 executing program 5 (fault-call:1 fault-nth:67): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:19 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xfeffffff00000000, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:43:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsh', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:19 executing program 5 (fault-call:1 fault-nth:68): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:19 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000240)=""/252, 0xfc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000140), 0x4) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000200)={'ipddp0\x00'}) write$selinux_load(r1, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) epoll_create1(0x80000) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000700)) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x9, 0x28200) write$UHID_DESTROY(r2, &(0x7f0000000100), 0x4) rt_sigsuspend(&(0x7f0000000780)={0x80000001}, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc018620c, &(0x7f000000dfd0)={0x68, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet6(0xa, 0x0, 0x0) 00:43:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:19 executing program 5 (fault-call:1 fault-nth:69): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000340)={r0, 0x0, 0x0, 0x6, 0x80}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) poll(0x0, 0x0, 0x10001) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x14) tkill(r2, 0x1000000000016) timer_create(0x1, &(0x7f00000002c0)={0x0, 0x2, 0x6, @tid=r2}, &(0x7f0000000380)) rt_sigqueueinfo(r2, 0x16, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}) timer_create(0x7, &(0x7f0000000240)={0x0, 0x3c, 0x2, @thr={&(0x7f00000003c0)="f5dc3e671ed41fee128f27ae1c93c65011c456b134f0c40248d9a6000f6b471dd8e7af9d51d1bb2829bb30a8d322ecdb6e09311f080c69b6abc458d7afb5127aa6797b1e8745ac4e69dd3de8c47e111ad2acf88a9fea4bf16d1dc15c068f3fd09b7bcdf96304d83ab9403b019056cff39869dc19c28c4ff08cb0ad85571358d3cc573748859b3047616c982ef2f05dbdec88ba433fd228c71ac30427cc40d2b912cb73cbdc59c126a67ba5d2e6", &(0x7f0000000480)="2f21aebe3ff2d311e2945fe3670fbb3896e016959cb25b30e411d7112aa97cfe31a6eb8c1df9bc782a8fa6a2fe6f47afb07a16562417d33a3460d7f766a12e4171f1135f79cbe4c1"}}, &(0x7f0000000280)) 00:43:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="627472667381", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) 00:43:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:20 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x80040200, 0x0, @loopback={0x0, 0x3}}, 0x1c) 00:43:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) 00:43:20 executing program 5 (fault-call:1 fault-nth:70): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb79", 0x64, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) [ 718.620419] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 718.623487] kobject: 'loop2' (000000009baa36b0): kobject_uevent_env [ 718.625839] CPU: 0 PID: 3933 Comm: syz-executor5 Not tainted 4.20.0-rc4+ #136 [ 718.625850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.625874] RIP: 0010:close_fs_devices.part.44+0x7c5/0xa20 00:43:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383", 0x59, 0x10000}], 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) [ 718.625891] Code: 24 18 48 89 f8 48 c1 e8 03 42 80 3c 28 00 0f 85 bd 01 00 00 48 83 6b 30 01 e9 7a fa ff ff e8 c2 7f 8c fe 0f 0b e8 bb 7f 8c fe <0f> 0b e8 b4 7f 8c fe 0f 0b e9 6f fd ff ff e8 a8 7f 8c fe 0f 0b e9 [ 718.625899] RSP: 0018:ffff888183cc71d8 EFLAGS: 00010212 [ 718.625910] RAX: 0000000000040000 RBX: ffff8881b9e14690 RCX: ffffc9000feba000 [ 718.625919] RDX: 00000000000277bd RSI: ffffffff82f30b45 RDI: 0000000000000282 [ 718.625929] RBP: ffff888183cc7380 R08: ffff8881ae9fc300 R09: ffffed103b5c5b67 [ 718.625942] R10: ffffed103b5c5b67 R11: ffff8881dae2db3b R12: ffff8881ce731b40 [ 718.625959] R13: dffffc0000000000 R14: ffff8881d851e000 R15: 0000000000000000 00:43:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) [ 718.639261] kobject: 'loop2' (000000009baa36b0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 718.639642] FS: 00007f78ff686700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 718.649693] kobject: 'loop1' (00000000f2246aaa): kobject_uevent_env [ 718.654620] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 718.654630] CR2: 00000000004d8698 CR3: 00000001b3550000 CR4: 00000000001406f0 [ 718.654642] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 718.654650] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 718.654661] Call Trace: [ 718.673822] kobject: 'loop1' (00000000f2246aaa): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 718.678922] ? kasan_check_write+0x14/0x20 [ 718.678944] ? btrfs_alloc_device+0x7c0/0x7c0 [ 718.678962] ? wait_for_completion+0x8a0/0x8a0 [ 718.678990] btrfs_close_devices+0xa1/0x210 [ 718.712674] kobject: 'loop1' (00000000f2246aaa): kobject_uevent_env [ 718.715314] btrfs_mount_root+0x13d2/0x1d70 [ 718.715338] ? btrfs_decode_error+0x70/0x70 [ 718.757738] kobject: 'loop1' (00000000f2246aaa): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 718.760001] ? save_stack+0x43/0xd0 [ 718.760017] ? __kasan_slab_free+0x102/0x150 [ 718.760036] ? kasan_slab_free+0xe/0x10 [ 718.772642] kobject: 'loop1' (00000000f2246aaa): kobject_uevent_env [ 718.779337] ? kfree+0xcf/0x230 [ 718.779351] ? mount_fs+0xae/0x31d [ 718.779366] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 718.779380] ? do_mount+0x581/0x31f0 [ 718.779396] ? __x64_sys_mount+0xbe/0x150 [ 718.779414] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 718.779433] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 718.779448] ? retint_kernel+0x2d/0x2d [ 718.779465] ? trace_hardirqs_on+0x310/0x310 [ 718.779480] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 718.779497] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 718.779516] mount_fs+0xae/0x31d [ 718.779536] vfs_kern_mount.part.35+0xdc/0x4f0 [ 718.779553] ? may_umount+0xb0/0xb0 [ 718.779581] vfs_kern_mount+0x40/0x60 [ 718.779600] btrfs_mount+0x4a3/0x2136 [ 718.779626] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 718.787565] kobject: 'loop1' (00000000f2246aaa): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 718.788338] ? rcu_pm_notify+0xc0/0xc0 [ 718.788359] ? btrfs_remount+0x1700/0x1700 [ 718.788374] ? __lockdep_init_map+0x105/0x590 [ 718.788393] ? __lockdep_init_map+0x105/0x590 [ 718.802659] kobject: 'loop2' (000000009baa36b0): kobject_uevent_env [ 718.803681] ? lockdep_init_map+0x9/0x10 [ 718.803699] ? __init_waitqueue_head+0x9e/0x150 [ 718.803718] ? init_wait_entry+0x1c0/0x1c0 [ 718.821213] kobject: 'loop2' (000000009baa36b0): kobject_uevent_env [ 718.821769] ? memcpy+0x45/0x50 [ 718.821791] ? alloc_vfsmnt+0x744/0x990 [ 718.821805] ? m_stop+0x20/0x20 [ 718.821822] ? mark_held_locks+0xc7/0x130 [ 718.821842] ? zap_class+0x640/0x640 [ 718.832580] kobject: 'loop2' (000000009baa36b0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 718.833834] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 718.833849] ? retint_kernel+0x2d/0x2d [ 718.833870] ? trace_hardirqs_on_caller+0xc0/0x310 [ 718.841663] kobject: 'loop2' (000000009baa36b0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 718.843539] ? trace_hardirqs_on_caller+0xc0/0x310 [ 718.843556] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 718.843583] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 718.843596] ? retint_kernel+0x2d/0x2d [ 718.843621] ? trace_hardirqs_on_caller+0xc0/0x310 [ 719.037956] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 719.042740] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 719.048195] ? __get_fs_type+0x97/0xc0 [ 719.052132] ? lock_downgrade+0x900/0x900 [ 719.056290] mount_fs+0xae/0x31d [ 719.059661] ? mount_fs+0xae/0x31d [ 719.063212] vfs_kern_mount.part.35+0xdc/0x4f0 [ 719.067809] ? may_umount+0xb0/0xb0 [ 719.071440] ? get_fs_type+0x8b/0x1a0 [ 719.075264] do_mount+0x581/0x31f0 [ 719.078814] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 719.084300] ? trace_hardirqs_on+0x310/0x310 [ 719.088722] ? copy_mount_string+0x40/0x40 [ 719.092964] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 719.097731] ? retint_kernel+0x2d/0x2d [ 719.101632] ? copy_mount_options+0x21d/0x430 [ 719.106132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.111672] ? copy_mount_options+0x315/0x430 [ 719.116171] ksys_mount+0x12d/0x140 [ 719.119822] __x64_sys_mount+0xbe/0x150 [ 719.123815] do_syscall_64+0x1b9/0x820 [ 719.127702] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 719.133074] ? syscall_return_slowpath+0x5e0/0x5e0 [ 719.138009] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 719.142860] ? trace_hardirqs_on_caller+0x310/0x310 [ 719.147886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.153440] ? prepare_exit_to_usermode+0x291/0x3b0 [ 719.158480] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 719.163346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.168533] RIP: 0033:0x459fda [ 719.171732] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 719.190810] RSP: 002b:00007f78ff685a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 719.198522] RAX: ffffffffffffffda RBX: 00007f78ff685b30 RCX: 0000000000459fda [ 719.205796] RDX: 00007f78ff685ad0 RSI: 0000000020000100 RDI: 00007f78ff685af0 [ 719.213070] RBP: 0000000020000100 R08: 00007f78ff685b30 R09: 00007f78ff685ad0 00:43:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getpgid(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f4", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, 0x0) mount(&(0x7f0000000640)=@nbd={'/dev/nbd'}, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000280)=':vboxnet1lo\x00') openat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='wyz1\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000004c0)={'erspan0\x00', {0x2, 0x0, @loopback}}) truncate(&(0x7f0000000000)='./file1\x00', 0x0) [ 719.220338] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 719.227606] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000004 [ 719.234881] Modules linked in: [ 719.242170] ---[ end trace 6c3f6297e108337a ]--- [ 719.247437] RIP: 0010:close_fs_devices.part.44+0x7c5/0xa20 [ 719.253850] Code: 24 18 48 89 f8 48 c1 e8 03 42 80 3c 28 00 0f 85 bd 01 00 00 48 83 6b 30 01 e9 7a fa ff ff e8 c2 7f 8c fe 0f 0b e8 bb 7f 8c fe <0f> 0b e8 b4 7f 8c fe 0f 0b e9 6f fd ff ff e8 a8 7f 8c fe 0f 0b e9 [ 719.277048] RSP: 0018:ffff888183cc71d8 EFLAGS: 00010212 [ 719.287966] kobject: 'loop3' (00000000ad08598e): kobject_uevent_env [ 719.294628] kobject: 'loop3' (00000000ad08598e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 719.295066] RAX: 0000000000040000 RBX: ffff8881b9e14690 RCX: ffffc9000feba000 [ 719.304927] kobject: 'loop5' (0000000073e71113): kobject_uevent_env 00:43:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000008000761105000000000040000000000000000bb8ab464b38c5d4bd68777bd4d5c6086f74d553c5df1d318e313058d0463f754253086017291e2fb33dedf0bf682800eaa099ec57651e94d9e5e0c9c47918ed5c0e9170e3847fd6d3acfc3afc60d08c12f5a7b504306e0c09db0067ca55a2b7adb3953753c283f2bb6f8e99b7ce3f45341b35fc6d18086a400000000"], &(0x7f0000f6bffb)='GPL\x00', 0xffffffffffffffff, 0x14e, &(0x7f00001a7f05)=""/251, 0x0, 0x20}, 0xfffffffffffffe4e) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x200, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000100)=0x1) [ 719.319415] kobject: 'loop5' (0000000073e71113): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 719.321955] RDX: 00000000000277bd RSI: ffffffff82f30b45 RDI: 0000000000000282 [ 719.343241] RBP: ffff888183cc7380 R08: ffff8881ae9fc300 R09: ffffed103b5c5b67 [ 719.354055] R10: ffffed103b5c5b67 R11: ffff8881dae2db3b R12: ffff8881ce731b40 [ 719.355458] kobject: 'loop3' (00000000ad08598e): kobject_uevent_env [ 719.366117] R13: dffffc0000000000 R14: ffff8881d851e000 R15: 0000000000000000 00:43:21 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xe803, 0x0, @loopback={0x0, 0x3}}, 0x1c) [ 719.377700] FS: 00007f78ff686700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 719.386689] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 719.392794] CR2: 0000000000728000 CR3: 00000001b3550000 CR4: 00000000001406f0 [ 719.399538] kobject: 'loop3' (00000000ad08598e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 719.411116] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 719.420450] kobject: 'loop4' (0000000035712a4b): kobject_uevent_env 00:43:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f0000000040)={0x9, 0x5, 0x9, 0x1000, [], [], [], 0x6, 0x7ff, 0x9, 0x0, "9145731fc804e80f519f91540d51541c"}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f00000001c0)={0xa10000, 0x9, 0x0, [], &(0x7f0000000180)={0x990a6f, 0x100, [], @value=0x7fff}}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, 0x0) [ 719.427143] kobject: 'loop4' (0000000035712a4b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 719.433544] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 719.448569] Kernel panic - not syncing: Fatal exception [ 719.454923] Kernel Offset: disabled [ 719.458543] Rebooting in 86400 seconds..