x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:10:03 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:10:03 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000060740)={0x7, [], 0x4, "88f48650c2416d"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055840)={0xac, [], 0x0, "bc79899248f237"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004fa80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000e00)={r0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041840)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r0}], 0xfc, "89c6bc235d5048"}) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000200)={r3, 0x7fff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004cb80)={0xfffffffffffffffc, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0xb9, "2d68fe373e081e"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000060740)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x4, "88f48650c2416d"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055840)={0xac, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x0, "bc79899248f237"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005a780)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r0}, {r3}], 0x1, "531dc66602126d"}) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7, 0xff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:10:03 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:10:03 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x62801, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000140)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000200)={0x0, 0x7fff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004cb80)={0xfffffffffffffffc, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xb9, "2d68fe373e081e"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000060740)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x4, "88f48650c2416d"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055840)={0xac, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "bc79899248f237"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000651c0)={r5, r4, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f00000661c0)={0xe53, [{r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r3}, {r3}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {0x0, r5}, {}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r4}, {r4}, {0x0, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {0x0, r5}, {r3, r5}, {r4}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {0x0, r5}, {}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {0x0, r5}, {0x0, r5}, {r4}, {r3, r5}, {r3, r5}, {r4, r5}, {r3}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r4}, {r4, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {0x0, r5}, {r4}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3}, {r3, r5}, {0x0, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4}, {r4, r5}, {r4, r5}, {r3, r5}, {r4}, {r4, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {0x0, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {0x0, r5}, {r3}, {r4}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {0x0, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4}, {0x0, r5}, {r4}, {r3, r5}, {r3, r5}, {0x0, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4}, {r3, r5}, {0x0, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r4}, {r4, r5}, {0x0, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r3}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {r4}, {r4, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r4}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {0x0, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r3}, {r3, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}], 0x7, "ce895985d1b860"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f00000671c0)={0x80000001, [{r3, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r3}, {r3, r5}, {r4, r5}, {r11, r5}, {r4}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4}, {r3, r5}, {r4, r5}, {r3, r5}, {r4}, {r3, r5}, {0x0, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {r4}, {r3, r7}, {r3}, {r3, r5}, {r4, r5}, {r4}, {r3, r5}, {r3, r5}, {r3}, {r3, r5}, {r4}, {r4, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r4}, {0x0, r5}, {r3, r5}, {r3}, {r3, r5}, {r3, r5}, {r3, r5}, {r3}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r4}, {r4}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4}, {0x0, r5}, {r3, r5}, {r3}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r4, r6}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {0x0, r5}, {r4}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4}, {}, {r4, r5}, {r4, r5}, {}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {0x0, r5}, {r3}, {r4, r5}, {}, {r3, r5}, {r4, r5}, {r3}, {r4, r5}, {r3}, {r4}, {r4, r5}, {r4, r5}, {r3, r5}, {0x0, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {r4}, {r4, r5}, {0x0, r5}, {0x0, r5}, {r4}, {r3, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3}, {r4, r5}, {0x0, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4}, {r4, r5}, {r3, r5}, {r4}, {r3, r5}, {r4}, {r4, r5}, {r3, r5}, {r8, r9}, {r4, r5}, {r3, r5}], 0x5, "e7d036deb7182d"}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000681c0)={{r4, 0x2, 0x100, 0x8, 0xfffffffffffffffb, 0x81, 0x1, 0x3, 0x8, 0x9461, 0x6, 0xffffffffffff8000, 0x3, 0x3, 0x7}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004fa80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000e00)={r15, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041840)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}], 0xfc, "89c6bc235d5048"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000691c0)={0x8, [{}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {r4, r5}, {0x0, r5}, {}, {r3}, {r4}, {r3, r5}, {r4}, {r3}, {r3, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {r3, r5}, {}, {}, {r3, r5}, {r4}, {r3, r5}, {r3, r5}, {0x0, r5}, {r4}, {0x0, r5}, {r3, r5}, {r4}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {r3}, {r4, r5}, {r4}, {0x0, r5}, {0x0, r5}, {}, {r4, r5}, {r4}, {0x0, r5}, {r4, r5}, {r4}, {r4}, {0x0, r5}, {}, {r4}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {}, {0x0, r5}, {r4}, {r3, r5}, {}, {r4}, {r4}, {r4}, {r3}, {r4}, {r4, r5}, {r3, r5}, {r3}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {}, {r4}, {r3}, {r3, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r4}, {}, {r4}, {r3}, {r3}, {r4}, {}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {r3, r5}, {0x0, r5}, {}, {r4}, {0x0, r5}, {r3}, {r3}, {}, {r4}, {0x0, r5}, {r4}, {r4, r5}, {r3, r5}, {0x0, r5}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3}, {r3, r5}, {}, {r3}, {}, {r3}, {0x0, r5}, {0x0, r5}, {}, {}, {r3}, {}, {r4}, {}, {r4}, {r4}, {}, {r4}, {}, {r4}, {0x0, r5}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r3, r5}, {}, {r4}, {r4, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {r3}, {}, {r4}, {r4}, {r4, r5}, {}, {0x0, r5}, {r3}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r3}, {r3}, {r3, r5}, {}, {}, {r3}, {0x0, r5}, {}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {r3, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {r3, r5}, {r4, r5}, {}, {r3}, {0x0, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {}, {r4}, {0x0, r5}, {}, {0x0, r5}, {r3, r5}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {r4, r5}, {0x0, r5}, {r4, r5}, {}, {}, {r4}, {r4, r5}, {r3}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {r4}, {}, {}, {r4, r5}, {r3, r5}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r4, r5}, {}, {}, {r3}, {r4, r5}, {}, {r4}, {r4, r5}, {0x0, r5}, {}, {r3}, {}, {0x0, r5}, {r10, r5}, {r12, r13}, {r14, r15}], 0x8, "d4638fbfcf33a4"}) 05:10:04 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xd, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvfrom$inet6(r0, &(0x7f0000000040)=""/100, 0x64, 0x12240, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:10:04 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x1b00b100, &(0x7f0000000040)="54ad53b96d6445356c0d3c3795753245a099b892741a5cb17a56654fe6513236a868d23e9dbc32feed71415ada4059477136676cecbfcad2e0fd26b0f10456c904ba0ab171e19f82069cb816d467a0db", &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)="eeb8253a67a75f6b9ffc3f427932660a99d452f941474a8b2abc6f89393c3bab6ebfa66424df56a21ba36c113b") syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:10:04 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x810}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) lseek(r1, 0x0, 0x3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@bridge_dellink={0x64, 0x11, 0x200, 0x70bd27, 0x25dfdbfb, {0x7, 0x0, 0x0, 0x0, 0x10, 0x10080}, [@IFLA_CARRIER_CHANGES={0x8, 0x23, 0x2}, @IFLA_XDP={0x3c, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r1}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x9}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x3}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x5}, @IFLA_XDP_FLAGS={0x8}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x1}, @IFLA_XDP_FD={0x8, 0x1, r0}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x240540d0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:10:05 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140), &(0x7f0000000180)='./file1\x00', 0x8, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x60080800, &(0x7f00000001c0)="527fa0116a7699e0076340997989d07453844bb60f2da45fb2284ee2c22a48c4a6e57ed93327d11dc0c481d2621e2777165560648991173e261575d2d72fddbf00e496225eb4dad99561164e0aed5063b666be0f3a0d621d05eb9581258d2991eb7677fef94ba22ac9db2f2f13cb5478e4edd9b47a512f8cf3fad71d80d4b8463c47754dd79f568298d6e55e61571400b73de5c521d13b3d4730378c577e279feb71d5a457ff05801c5dd29f949e19490ad8e011c6bdf51bafd64a6df9aff4742f6c9f55fed0d38da2e9ba7f59c65eee", &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="0388644daa04724133b8697cb6755a5bbce10a232317349aa5d1c7a927f271d74005cb38c15354ec3999e7cae36ab5c204a75ad4c1ae53431ac97b8544c3c8d6ec068a54e2b52b9e8060ff61d25b39f12c3c0ccba29a67580223c69851dea1d1fe0da93877bffa680480d67da04643f2915f82125173cea05519cb97587c30b541355a01d551236aadc42161a4958835d41a0b31b160b454b38892406dc850bf083d579ea7c44f7bf61720f4740cd07dadb33e876a5bf370af43a14ec63b01fba8110c0377cd0ee3444384457be0adf8004302e5c1f06c1cc623439f") syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:10:05 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:10:05 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:10:06 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3a) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x2, 0x5, 0x7, 0x6, 0x0, 0x5, 0x11008, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfff, 0x2, @perf_config_ext={0x2, 0x431}, 0x8000, 0x800, 0x18, 0x4, 0x4, 0x81, 0x3, 0x0, 0x1ff, 0x0, 0x8001}, r1, 0x8, r0, 0x9) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x10200, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:10:07 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:10:07 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x810}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) lseek(r1, 0x0, 0x3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@bridge_dellink={0x64, 0x11, 0x200, 0x70bd27, 0x25dfdbfb, {0x7, 0x0, 0x0, 0x0, 0x10, 0x10080}, [@IFLA_CARRIER_CHANGES={0x8, 0x23, 0x2}, @IFLA_XDP={0x3c, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r1}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x9}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x3}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x5}, @IFLA_XDP_FLAGS={0x8}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x1}, @IFLA_XDP_FD={0x8, 0x1, r0}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x240540d0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:10:07 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:10:07 executing program 3: ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000004c0)={0x5, 0x101}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x5, 0x6b, 0x2, 0x8, 0x0, 0x8, 0x84080, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3f, 0x0, @perf_config_ext={0x4, 0x9}, 0x41018, 0x3, 0x4df4, 0x1, 0x8, 0x401, 0xff, 0x0, 0x3, 0x0, 0x100}, r0, 0x4, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x0, 0x9, 0x8, 0x40, 0x0, 0x9, 0x4200, 0x7, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x1, 0xfffffffffffffeff}, 0xa000, 0x40000000000, 0x0, 0x5, 0xfffffffffffffffa, 0x3800, 0xffff, 0x0, 0x3, 0x0, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_int(r1, 0x0, 0xb, &(0x7f00000002c0), &(0x7f0000000400)=0x4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x6, &(0x7f0000000340)=[{&(0x7f0000001780)="6f070ab240ce0a2acb24077d52a1b6ff247971e71731010864660486b311aef2bc685226d1bd8a6eede21ef4252162416c9a892820f755a6063c3f026898e7cda5182e78e7db6272f84f22a856da23445c869adcd6625c4192c6e366c957916b44ba7c4ac23e8019b42bc473169df847ae6ffc7b51d61ea9dfd30cb8b236de87c205ebbbc3a53d9d449953e8e143ec6542b90f4f221c6ac3b96d3192bb91d7765d95e5094855b3072e15ac34f8c513df1e874148bbc3d68fccb8ca2384978b5f3bb4169822f155b41f9339ae491aa623b33cf6b358711a6ac4e06ce3ddcc18a5fdb157d3d0d35e1950056c3ddc7af336cd974819263957e5206c26dee0603645ab71d2a7574799c1ec1cd3b4fedc30c65e1bf0048965b1bd9e1a3772ab7162b55998620a4073b1c73c3bdc62551b24dfd5b6a218fbe4f8170ba526ac1050072e0538b5974da3422b0cb07ada204c1312148eab8b546cdd44779c148e102a645959fdc6bbe7cb27f9889654d0d276736318fa3547678fe6099ba33d9bb7ae640a08", 0x181, 0x7}, {&(0x7f0000000180)="a74e223cbe416ecaad3b2218a6ad5aa5b5d934cd33809322df9c772f78bf46fb789025fd1b2079276ea26d2e7654d9956294ecda54fd3c33224e6e4485e4e899b6d681a66e19c5d7fb34a8f9ea048a1bbb5b1d49ed7b4215f946570fb917d669f71dc76b13266b47c288530feb17239dc838e1099835d56a61415e6f16721505bb17c24edb8215ee0dcdfbc95d1f30d119c3d37a0af04274fee7bb62c7ee804f5eff2d0baeafbb04ca1b289a53bdd89b36162898cc7ffde31f1b3f746403827776acec2aa34dc5264bb55ecfc1333467431610b186ae90d166bdc26d1f3e3c1bef5ef7653a5a", 0xe6, 0x9}, {&(0x7f0000000280)="3480da2e3c199d86ffa9a0f27d23", 0xe, 0x800040000}, {&(0x7f0000000040), 0x0, 0x1}, {&(0x7f0000000780)="0eff40d3aed9771f736d0d4b0d3a84ea02e64cd1f2e6ff6fcee7ec2403630f81566018fa853a5d75da1ae12cee79ebcebc98cb26c116fe2bc7cbdd893c1a059d02159edaeb31827cbf3d3085bf56099d808dc0f0d5664ffa4e3097c882d8987c8168957135746613d876e63edaa94784f7e7a04b7c776973f4284619a5e3ac36517310adcd24c5c6a890f933505241443ecd28d15dc5b93bfa5d5f3a222a5b3a369bfbec00382547e3a7eee0f61965097635e1f14cb4864fb60c86fa52ea3b3c931f43b72bb188e130037e215dd59839717bbcfd76f0c967a32e50eddd13db4a179e36c8deafd481ab86a9e45aefe306b5162f4169d064cb030dadcaee9855aa9cdf984b5886f598e1d461b29bdfdd753b4f8ded368a8494afa672663d760366ab346339140a2972daf38a2cbbbc0eacdd95357bfddd848f874921ecdf2e47f5f888bcd3a414b8b52beb4459aea8653d06e9bcedfc28efc4eb8aea6ba8d7fcb6f825429a24a399d08e70103440b25057c27de026973290868c00e589ab081f9c5d8d49353857cb67b0274a9488ea69911eeb29e72f7492df8b808c2ddb4a3c46ce598883efa6b3357e1057a59131e47210a09318b36b4b4cb32b69763306047c2d14fd1ad2554dbb25206dc758c200ad5198da5a7a798c0bf61e114c1d2733b76943957fd1f0fbbaaa172d37a83fdacaca66fd36f6ea5d843cb051c40cf443a1df514c4669019ce3c9e72cc80963fd582c14554437822a425d082016116aa011a9a393a4fde8113225800d3028ab9542a2c624c1307a44841ae0bdff33fc9cacba12150faa39f6211587f3c2de5c5180b4e4588836f72807bf6d2a87515a5a743c47bc6ac673486332f9d5f7a52cc2fe9d45f73580241267b87b9513974f33a7b8db776560f5a86aa06e2cd30297d6dc3528b40b4c368393338db186ae8d876ba6bcc61518b1f0521cbc054c83e4e8bcd38e4a5ee93fa1016615d9d97e2aad66daa512c88d197f24c2996944207b8afc64ce607a913cc941e46b3913aa05f852216146a77e3f3f349bef52619f5e6b71849115f2458b2bf61709524f6204791166c553fe6e1b31402b2b9047de72febad6c04299fbef5152ef4fe17fb3449f90776fcb80f6c0645a45dc297eeca9a4128c66a00995c74fb461756eea4403f5ace1d88f037104fbf00bc3c518ef170352c2ea537fe00e05fa2ec351e15a3406ed5f4d30b00f2b8f09dc2120c6672fcf96c3ca34f3f54b08f709a55f126da9936d33007e0c3faa97ed5a42a751cfa6fb103ced567543e5842fb4c15b0b02498cce64f1fb581f05ecae7f78e75f2f14ca8e5463aac23e0776dcdc0727ad23809be0e216296e01820f3072764a198bcf8170e4bacba9fb1da00b24a723154c3f18e789ad0498d15da379692f00c1fd1396173e4b49751b111ecbb5281d2dacdba539cb0c140498f9c0a9066eafe48146768ab1f9de0669ba68e56c95a2c44de2ee2bcfd4db15ee48aa76735d173a42b4f2f02952ca45fa82cb5a79562947a51f600d5522e672f99081f9cc8fac16291ecebf13de0e86edce8937a05c88d20c32b8e2a30f30bc817cf2cfe15b8c5a44588d3301b4926833396ded11fd37313008407939566e32db067e2d7816d687be03eb353457c2ae86842fb1ce1841db4d6b52b62352fd01af3a069ab7a7833a6853ca41b3bd7a314f470dac1ba9ff39b98a8807d511cd7036866aa8d5b2ffcddae67e3825da4ba99214eac7ab0889e168bf76394b5c202c9fa387407a517b25ac221b4d0f3db951cf54f0d6071ab6af4f847f3dd4046161270c633b88ba74a112949878c8156bfe443afb26bfdf482e0e2ead512fc3c16b20e8de2b7ed5d9c240d7de53fa2f4e6c51b88a8fe2ad70c13f3b07145270f949853ab7674accb8c8a61091e59f6b142bfd258799031fde0e1aa330348566dc7da21f0fb46331a466440bed8ea3e6a82babd3cfe21ec3db3f9fe3e804a3cd3588289794b3ca3b7b24dbd51acddfda5f03f92bbbdfa2e6001a8bb3afcc0ec45a33b382753a75933031f250be14a176d2dd10b534355d0889de6e6f412a8ee36e895ddf51e9cd3c6f676888204cd10904c3bc3f7e744e34c56d776d54b138a3e68b542902450a5359598864d0b327a2d1631223d33c02d55d7d6f38f1803f0b96d856bb026f4eef7ae5c31a12d3a07ec79f699ee93f42af689821ae757b8ef1846c80536a6d9c09f8d4fd909f910bfb6dbd89c0f403d3a1ea250158be6801fec820c9f532f3bee26e6dd5d652455f9be6155aa3056d8f67f965a44b4a5df1b36fad25bdce8d07b3035f55912de22d646d46370a047b4905f5f1493336bc627efc97745649423f35fd1df391d412576d132f0bf4f20e0af38221443ce270efc54c59947b25876f4ffd2a385973c3ab1d4b47023cb91697fd653d63aa326224d232535a02841691e962ce37fba243df204ca2c3cbcc62e7056ea06fa8025aa2403cdfc93a6df68b24bc837062a38809fb526c1083dbd05d4c2ea6c4da1bf30624a4819e18be8ae4860fc5d13979a43dba3de52063681e184e28346f4b21e8e56eeffd26d347bff2417d437e9fe79a55da9b16806b1a167526eb619374caeaed2c280c6011016f544ec796481da6cea6ba4f9874b9cc390e7491bef254132649c1fc0e22bddf8d2703080cf93dc313725db1b4e720e48e6d4fe1128e02e25da5efd08e2f1535835022c735c9288630ecb1eb4e4ffee52cefb0f73d58faa5268251b69869c35c3ddac3bc2932d62181db03f14a7e1b1428a74d5e18ce698ef829879aed6711f01c473b64aa485139d548ccfede2629e4a3d96c2801b21f00461114a9743a587e969e622949758975e1340244350b851910dd8c3e47361f2fb14d632e05ee85bd50648e7d20f783efbc69d802b437d24e1b926d657e3412640888ac449ac5714d355a88b590bd9097f3f2e931ab3da54795f4b7aef4b0d251203e3b66ef4082b0256acf7f74c56327f28dbf903a30334d0444b2cc36ce399de5da3c92a55377291a29895a54d80528b3a4106165ac0bfd213d909b29ba6eb85205f7c93207528e81986523dea32d94ee5913ac594e241909253b48c88e8890872fb5d1b44381f2a40f5e1ecd14aa3f05c16866113c6f30eca4d42860747c3313354bb116074ca81bdbaaadb3a9fc4bbc5d96ced1f86b8d3a223d2daddd7f0e9b5445647234706c24d9d7891c93863257b42444b5692c66898a21836e8658fa65a7815bd8b1300c8960dab677a1aae2dace98ab3042a89c554ecacce1cb29e5138e9c2c5cb6bce9df05f53c9c7ad7564329d44e076691d4343bc9282439bfea3a332ec9fbe5ab9cd3b9b03b1e57545b5a1b91a876721b530d719975444fe1562e1631402e53eebe328a54779d7048dddb9f1822b209bc95416951bdcaa0faed0d22930e8839f3caef63bbd41ac9a1090d2ca00d4a9d226804a884c7b6526d18811a82200c6a50936e57ecd190e5345737417e4d466e0fbb0119a01d102128d188c7be7789ce1cfd58f0ade0229d3890a670e7ff9937ecdb166bbcbd3cb68b5af1ab2d24fee72eeede5de973f7d563b0fa4d3f93b3711a9d5bd4d115e21739acb4a96abdad79c669404c464ab644a8dad66998cbd9f4c559b4d7bef285e02fa20c626886124232c5e391b274153204ff2ee08c7a53869a5fc24b2ef7eebc7b1d6757d249885fe428729764129eaeafa01e3c7864d480ffbb795ff7f7723e8705a9be499696fc306bb79ceeba6dc73e9dc00619e57701a10a50a0efd3acafd5506688e4b3e72457f1f0ca1ee17a5a38eddff7533e4b2d8188bea712b085ed1bc1484992904ecd4d47d2d327f88d1a7a5fa640aabc5040b854d8202323a0c9831a3174d424a1bd982ae48a74f5f5164adc769928242394cc3d3be98cd69b91568a959d3a1a07ebc66d737b8e9b606a4a7ab3045887732200371319a5b1017f66ebdfb01ff4d63563bfacbaf29e298d573e6e1d0f7bfa1da9b20e1475a6bf3277bb0f211aafd3269de1345e85729c812beb00a3313a7f7ecf6de721bf5f519540a0537344ffafc4f3be399ad54b8a74eed3d18c9b88b3b5c66eb2941bd399f7a91447a0975015058d881b53166e991c2162d4426a7ad93f9886b98268cf8596ac522c5d33769c33ea811046dc8c4e8305187a3ad6eb1979f88b2cb9f2431b394472210ec14f24f6c954416fe23107d94975ddd9f1090269205bb96b496c476e71a876d781d9103ffeeadf2d98c094e9a75fba4a97872d5d53d99336473e96f00358fe09a7b05e165fbca1f7bda6a03d9a64b736ab84b82a54ca15f84345eece82cc94352465f2c4b56e8f00eb359736d69d2c5efd6563e6f165d84cd703c0515ee0062d94984a161b02a2bbf59744f7c31e2cf721b4e6bf01b34df11cc12927db1c972ec82f21ae6cadcad094b634b5453bed9306f870c9614f930bafb762c321a27c3c4a4901791f06bbf8ded11741d17f7de06b7044db5e415fda469b4ec8be2ec53cc87cbc0b057c176cf67d028996da33b9d786fc3793adcc3f3dca48c9a16d704d835f4bfea26b2391cc91f2cada63af997295cf23b242b3396654708fdef2342670880633d5d8f7a825b634860c32af8fbdf9dbb24a4f8acf014470693a0de79efd7fab844f43a3b218c299cedde34f5248f3dedf9f1d63b3a74394bbffe3ad4ac6f9510672269e3df0d060682d280d3ff275a5ab188e8eb2238bff1b51081100829f22fb10d6ef4d42cd190a2dd4792e52b82d165456eb2e9291289a8259bb6612289fad2d752fdc8d7c2b74a28f20efb53b5121e580c76f8296369ba025eb0c87dd2ed4890d0985a9d844b9028fc08cb84467ab2b2e1b309f9e048ffce1a1988f3f97e1bd93a0e44ce21d7ab4bfd1f67748fb8c78ed9dd7cb4712422aea4e77b8864af0f6cd47a28ac73e369c73f90cd53615116c54ff3e6465889bde220347ea889b5dabce96caa8007091f1b2349ea149c89fb98f5a6078ab4de0d9388fe2055a2dc5335a96665b4fc87681b447be8a16f8a4107bfd96f533fcde41fff210a16ceaa734e18c46e4af1cde31dcbd9f54c96272612b92e8a9383fd111a4008e1903b4a495f8bb2673b775a67a0c52a987b0fc75d5a40c378cd8bd1d632bde20dfb0ce8cd3f64da9d533cec3fe398f66ebca53f477436d72217b4aae4036c54554a800078f7580b2a51acc0c38cc83e971eac31f39625ae0896a2aa39908bd5524035b82adcee911c8e396c7ad29d8c24c76fe98950a85bca5750af9964bed992698f6683a42bd328d00fc587e187d54702950ab3f89d8f659ec8b5fd918af4356d6b03418284dde107ba7591b5c026fb82f64f99e0aa8dd65f6c82fc0b6effd1b5e55cd1cd1fb51dd7a34e4bb0cf166690291c1730099d331a31869e3f101cb1ed5159a0f330dca28e8fdd641f19865a6718f9ceae81af39b553efbd065032e285afd384b59d3b89fddbe4b03c034be88f4b5fef420c7bc6be421afb462aa502833354cb9785624fa25a79a00b27e2713bd906eaa36aaf5ec69eecea7ac83565f3dd0c51b16805d4381e378d64d76b8bafa5318961e28a43ea4351e154acd068894e6d4f629af9cada274577812370f0d521ab0d999fc7ca2f07d18206890eaebec232c0dc4e61238d1e9ac88b73aa3d578badce801b240c8c39b9c7d692405319efed9b9480f82cf9ea68eef99a46888bd81db623358ec7d140ba43abcf491ae4f10218c3feff4bf82707cef91ad664516eacebabaa8c798f0bc5fcf0984", 0x1000, 0x101}, {&(0x7f0000000300)="9b6fdab4dcddfed60233e782ef0f727230b084dcf8453883ed41ce3b6a81b2c3f30ce62f", 0x24}], 0x0, &(0x7f0000000140)=ANY=[@ANYRESHEX]) poll(0x0, 0x0, 0x1ff) [ 674.713778][ T9039] device hsr_slave_0 left promiscuous mode [ 674.857613][ T9039] device hsr_slave_1 left promiscuous mode [ 675.013167][ T9039] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 675.020611][ T9039] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 675.323312][ T9039] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 675.330865][ T9039] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 675.618502][ T9039] device bridge_slave_1 left promiscuous mode [ 675.625251][ T9039] bridge0: port 2(bridge_slave_1) entered disabled state [ 675.972078][ T9039] device bridge_slave_0 left promiscuous mode [ 675.978331][ T9039] bridge0: port 1(bridge_slave_0) entered disabled state [ 676.348905][ T9039] device veth1_macvtap left promiscuous mode [ 676.355082][ T9039] device veth0_macvtap left promiscuous mode [ 676.361288][ T9039] device veth1_vlan left promiscuous mode [ 676.367233][ T9039] device veth0_vlan left promiscuous mode [ 681.459103][ T9039] team0 (unregistering): Port device team_slave_1 removed [ 681.841548][ T9039] team0 (unregistering): Port device team_slave_0 removed [ 682.106997][ T9039] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 682.504120][ T9039] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 684.015844][ T9039] bond0 (unregistering): Released all slaves [ 685.331852][ T1194] ieee802154 phy0 wpan0: encryption failed: -22 [ 685.338247][ T1194] ieee802154 phy1 wpan1: encryption failed: -22 [ 707.101142][T17394] chnl_net:caif_netlink_parms(): no params data found [ 708.609348][T11529] Bluetooth: hci2: command 0x0409 tx timeout [ 708.721227][T17394] bridge0: port 1(bridge_slave_0) entered blocking state [ 708.728386][T17394] bridge0: port 1(bridge_slave_0) entered disabled state [ 708.736573][T17394] device bridge_slave_0 entered promiscuous mode [ 709.410948][T17394] bridge0: port 2(bridge_slave_1) entered blocking state [ 709.418776][T17394] bridge0: port 2(bridge_slave_1) entered disabled state [ 709.426942][T17394] device bridge_slave_1 entered promiscuous mode [ 710.092289][T17394] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 710.232920][T17394] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 710.699709][T11529] Bluetooth: hci2: command 0x041b tx timeout [ 710.776149][T17394] team0: Port device team_slave_0 added [ 710.992000][T17394] team0: Port device team_slave_1 added [ 711.690979][T17394] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 711.697948][T17394] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 711.724055][T17394] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 712.420772][T17394] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 712.427743][T17394] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 712.454214][T17394] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 712.778874][T17241] Bluetooth: hci2: command 0x040f tx timeout [ 713.741089][T17394] device hsr_slave_0 entered promiscuous mode [ 713.848484][T17394] device hsr_slave_1 entered promiscuous mode [ 714.018024][T17394] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 714.026343][T17394] Cannot create hsr debugfs directory [ 714.848913][ T7926] Bluetooth: hci2: command 0x0419 tx timeout [ 716.772794][T17394] 8021q: adding VLAN 0 to HW filter on device bond0 [ 717.130234][T17291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 717.138202][T17291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 717.152679][T17394] 8021q: adding VLAN 0 to HW filter on device team0 [ 717.370582][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 717.379396][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 717.387889][T17241] bridge0: port 1(bridge_slave_0) entered blocking state [ 717.394951][T17241] bridge0: port 1(bridge_slave_0) entered forwarding state [ 717.840797][T17394] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 717.851528][T17394] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 717.898271][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 717.906344][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 717.915567][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 717.923976][T17241] bridge0: port 2(bridge_slave_1) entered blocking state [ 717.931096][T17241] bridge0: port 2(bridge_slave_1) entered forwarding state [ 717.938819][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 717.947576][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 717.956359][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 717.965809][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 717.974327][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 717.983084][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 717.991614][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 718.000000][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 718.008619][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 718.016986][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 718.060318][T17394] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 719.578415][T17394] device veth0_vlan entered promiscuous mode [ 719.590844][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 719.598981][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 719.606701][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 719.614249][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 719.621841][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 719.630710][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 719.639476][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 719.647828][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 719.765137][T17394] device veth1_vlan entered promiscuous mode [ 720.466450][T17394] device veth0_macvtap entered promiscuous mode [ 720.586452][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 720.594421][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 720.602410][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 720.611051][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 720.626230][T17394] device veth1_macvtap entered promiscuous mode [ 720.962889][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 720.971613][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 720.995717][T17394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 721.006246][T17394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 721.016249][T17394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 721.026788][T17394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 721.036755][T17394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 721.047251][T17394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 721.057153][T17394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 721.067606][T17394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 721.077509][T17394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 721.089288][T17394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 721.100896][T17394] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 721.109387][T11529] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 721.118301][T11529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 723.019461][T17394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 723.030110][T17394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 723.040390][T17394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 723.051114][T17394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 723.060958][T17394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 723.071404][T17394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 723.081288][T17394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 723.091766][T17394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 723.101633][T17394] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 723.112104][T17394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 723.123203][T17394] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 723.132596][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 723.141770][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 725.974182][ T52] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 725.982421][ T52] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 725.994559][T17241] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 726.397971][ T52] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 726.406130][ T52] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 726.418050][ T9054] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:11:01 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6d, 0x6d, 0x5, [@volatile, @volatile, @volatile, @typedef, @datasec={0x0, 0x4, 0x0, 0xf, 0x1, [{}, {}, {}, {}], "af"}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x8d}, 0x20) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:01 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:01 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:01 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f0000000140)=""/233, 0xe9}, {&(0x7f0000000040)=""/31, 0x1f}, {&(0x7f0000000240)=""/112, 0x70}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/35, 0x23}, {&(0x7f0000000300)=""/65, 0x41}, {&(0x7f0000000600)=""/208, 0xd0}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000001780)=""/117, 0x75}], 0x9, 0x7, 0x4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:11:01 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:01 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x0, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:01 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000040)) 05:11:02 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg$unix(r0, &(0x7f0000005140)=[{{&(0x7f0000000140)=@abs, 0x6e, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/219, 0xdb}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000040)=""/42, 0x2a}], 0x3, &(0x7f0000000300)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}}, {{&(0x7f0000000600), 0x6e, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/106, 0x6a}, {&(0x7f0000000400)=""/53, 0x35}, {&(0x7f0000001780)=""/147, 0x93}, {&(0x7f0000001840)=""/4096, 0x1000}, {&(0x7f0000002840)=""/238, 0xee}, {&(0x7f0000002940)=""/169, 0xa9}, {&(0x7f0000002a00)=""/161, 0xa1}, {&(0x7f0000002ac0)=""/88, 0x58}, {&(0x7f0000002b40)=""/49, 0x31}], 0x9, &(0x7f0000002c40)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x140}}, {{&(0x7f0000002d80), 0x6e, &(0x7f0000003100)=[{&(0x7f0000002e00)=""/149, 0x95}, {&(0x7f0000002ec0)=""/124, 0x7c}, {&(0x7f0000002f40)=""/234, 0xea}, {&(0x7f0000003040)=""/192, 0xc0}], 0x4, &(0x7f0000003140)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb0}}, {{0x0, 0x0, &(0x7f0000003440)=[{&(0x7f0000003200)=""/43, 0x2b}, {&(0x7f0000003240)=""/213, 0xd5}, {&(0x7f0000003340)=""/223, 0xdf}], 0x3}}, {{&(0x7f0000003480)=@abs, 0x6e, &(0x7f0000003680)=[{&(0x7f0000003500)=""/208, 0xd0}, {&(0x7f0000003600)=""/123, 0x7b}], 0x2, &(0x7f00000036c0)}}, {{&(0x7f0000003700), 0x6e, &(0x7f0000003980)=[{&(0x7f0000003780)=""/138, 0x8a}, {&(0x7f0000003840)=""/146, 0x92}, {&(0x7f0000003900)=""/68, 0x44}], 0x3, &(0x7f00000039c0)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x90}}, {{0x0, 0x0, &(0x7f0000004f00)=[{&(0x7f0000003a80)=""/54, 0x36}, {&(0x7f0000003ac0)=""/235, 0xeb}, {&(0x7f0000003bc0)=""/219, 0xdb}, {&(0x7f0000003cc0)=""/91, 0x5b}, {&(0x7f0000003d40)=""/4096, 0x1000}, {&(0x7f0000004d40)=""/151, 0x97}, {&(0x7f0000004e00)=""/190, 0xbe}, {&(0x7f0000004ec0)=""/46, 0x2e}], 0x8}}, {{&(0x7f0000004f80)=@abs, 0x6e, &(0x7f0000005100)=[{&(0x7f0000005000)=""/237, 0xed}], 0x1}}], 0x8, 0x44dc5363210fa7b9, &(0x7f0000005340)={0x77359400}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:02 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:02 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:02 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x0, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:02 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:04 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3a) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = dup(0xffffffffffffffff) lseek(r2, 0x0, 0x3) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x3, 0x1f, 0x4, 0x20, 0x0, 0x9, 0x41438, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x100, 0x1, 0x3f, 0xd, 0x8, 0x101, 0x1, 0x0, 0xf28}, r1, 0x4, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:04 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x400, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50118, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76caff7f0000000000000274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:11:04 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(r1, &(0x7f0000000600)=[{&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000140)=""/231, 0xe7}, {&(0x7f0000000240)=""/218, 0xda}, {&(0x7f0000000340)=""/221, 0xdd}, {&(0x7f0000000040)=""/22, 0x16}, {&(0x7f0000000080)=""/5, 0x5}], 0x6, 0xb2, 0xfffffe01) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:04 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x0, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:04 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:05 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:05 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x1, 0x0, [0x0]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYRESDEC=r0]) poll(0x0, 0x0, 0x1ff) 05:11:05 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4100, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x52410, 0xffffffffffffffff, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:05 executing program 0: perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) faccessat(r1, &(0x7f0000000040)='./file0\x00', 0x42) 05:11:06 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x0, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:06 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d303030303030303030303030303030303030d7303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf60e7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cc9beb10aae14c06f9ec6f8213b414064000000000000009660b4383a00000000000000000f562ce166c782e65efe11e8cf33c134ff97f9300bd5e764b6276b1a8fe77fcbab99fcc0d8eccef51150b2de061000e0b3be5e091407511ae83091bd4774f6082a0eea3b642dddade89f60d9ae98f436617d70679335125b15b5e67a218fff030bc0416ea0a97575e901918b00b97ab0e1954ad0477171c10e52e26d8bff6dba2ff2d776aaeec3bbbcf900403e137ac75cd8ecced64a012e8d6d540353a84c64a55006af41de52674db86063b4cce7ba728caa039c601caebb351a124a1026927868932e05afb3473acc0dc03deb0c9c7cb76c28fa9b51"]) 05:11:07 executing program 0: perf_event_open(&(0x7f0000000700)={0x5, 0x80, 0x0, 0x0, 0xff, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x1010}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/keycreate\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) fcntl$setownex(r1, 0xf, &(0x7f0000000080)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:08 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fcntl$setflags(r1, 0x2, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:08 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:08 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x0, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:09 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:09 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x54430, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000008c0)=ANY=[@ANYBLOB="130000e21d35e35542eeb3193b0a37b87c9da9d15760122118be2ee1705e4fd00e48abe20a20c7d78b896fdddcecec663ecba7982f15031f7a88ec47f7c722f468a8aa766cff58344e6bada8950f1bb49b22eeb74d1d82f6941b60f139b66bcdef7369a223a5380b86b30349ec8a102adbf1355f64bf723accb18c23e548a0fccebab88461ba1c88bba7057f7b87f05560d48ad5", @ANYRES16=r2, @ANYBLOB="050000000000000000000600000008000300", @ANYRES32=r3, @ANYBLOB="08000500020000008f951fd8c6ce0ebf1760dab19c4dfa4797d5517348e1f8163edd9b7dd5415129393d0000000000000000cfd779e9d628ce7d2af62b46ffd975e2b53833f910c115bb1d3c1d"], 0x24}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="050000000000000000002100000008000300", @ANYRES32=r3], 0x1c}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000, &(0x7f0000000240)="b89b229dff074e79ecb2f6e9d99ea4a186686188ffd4589147341a1f74a31690ab8d973a435918aace79d32c1b8ba22d84372c590a7eda6c215bd7fc562668186622f09b73131c3e91180bf217361df7fd5b151dd2af2efad1ab3c944a5388b10e670346ccc9f99534f0fec8ce03b850fc6ba1e7cde1f8e8bcbf016398e5de6007fa29f51dea8b3f74c81645ce2fbc6ed4", &(0x7f0000000400), &(0x7f0000000600), &(0x7f0000000780)="be7ea191e80a969df536ac69bb279b535f2cfbd91b2c9fd9b4d783d8a76e4fb8fe324beec84e2f04eb1b38fd79d7fdbfd688ec1a4570dbaba84bf31c29532fe24545d4026784aef2113544612cc28fa6fa5d12be8507dfb2f3b1c3a548e40e50074e94deaf2ac0642f47dcc46c3146b6fcd20642ec38e82bfd9aed67cd7af6b8045da40b7577f5cb442cd713dc313892ea9d49b5dfb074af1fd899969f26fafe8706a02fd411af148d74bcedb74684a17faf8d423a2b58c772dd5c23c1c1a4418efc8d23aa10d5cc9fb2a4877eb9af06da721068bb") syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000880)=@random="16b3", 0x2, 0x0) poll(0x0, 0x0, 0x1ff) 05:11:09 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:09 executing program 2: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x64b], 0x1, 0x0, 0x0, 0xffffffffffffffff}) read$sequencer(r0, &(0x7f00000000c0)=""/28, 0x1c) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:09 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000000c0)={0x40, 0x1, {0x0}, {}, 0x1, 0x6}) r2 = perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x20, 0x8, 0x2, 0x6, 0x0, 0x4a3, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x101, 0x4, @perf_bp={&(0x7f0000000140), 0x5}, 0x42000, 0x4, 0x0, 0x4, 0x1, 0x3329, 0x2, 0x0, 0x8, 0x0, 0xfab3}, 0x0, 0xf, r0, 0x9) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6e, 0xc7, 0x8, 0x7, 0x0, 0x1, 0x80000, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0xe882}, 0xa424, 0x1, 0x80000000, 0x3, 0x7ff, 0xa9, 0x1ff, 0x0, 0x8, 0x0, 0x100000001}, r1, 0xe, r2, 0x1b) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:09 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/52, 0x34}, {&(0x7f00000000c0)}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/255, 0xff}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000600)=""/206, 0xce}], 0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000000c0)={r0, 0x1, 0x100, 0x78e}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000003780), 0x4000, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000003940)={'ip6gre0\x00', &(0x7f00000038c0)={'ip6gre0\x00', 0x0, 0x2, 0x1, 0x3, 0x8, 0x4b, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @empty}, 0x20, 0x10, 0x2, 0x5}}) sendmsg$nl_route_sched(r2, &(0x7f0000003a40)={&(0x7f00000037c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000003a00)={&(0x7f0000003980)=@delqdisc={0x64, 0x25, 0x100, 0x70bd27, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0xe, 0x7}, {0xc, 0xc}, {0xfff3, 0xf}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x3f}, @TCA_RATE={0x6, 0x5, {0x0, 0x3}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x4}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x6}, @TCA_RATE={0x6, 0x5, {0x1, 0x13}}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @TCA_RATE={0x6, 0x5, {0x1, 0x7}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x7}]}, 0x64}, 0x1, 0x0, 0x0, 0xc800}, 0xc000004) ioctl$RTC_PIE_OFF(r1, 0x7006) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x10000, 0x2, 0x0, 0xc, 0x3, 0xffff}, 0x20) 05:11:09 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x3f, 0x5, 0x1, 0x0, 0x2, 0x28400, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x0, @perf_config_ext={0xfd, 0x7fffffff}, 0x400, 0x0, 0x0, 0x4, 0x321, 0x480000, 0x380, 0x0, 0x9, 0x0, 0x5}, 0x0, 0x4, r0, 0x3) socket(0x6, 0x0, 0xbc) 05:11:11 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x40, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:11 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) 05:11:11 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/52, 0x34}, {&(0x7f00000000c0)}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/255, 0xff}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000600)=""/206, 0xce}], 0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000000c0)={r0, 0x1, 0x100, 0x78e}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000003780), 0x4000, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000003940)={'ip6gre0\x00', &(0x7f00000038c0)={'ip6gre0\x00', 0x0, 0x2, 0x1, 0x3, 0x8, 0x4b, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @empty}, 0x20, 0x10, 0x2, 0x5}}) sendmsg$nl_route_sched(r2, &(0x7f0000003a40)={&(0x7f00000037c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000003a00)={&(0x7f0000003980)=@delqdisc={0x64, 0x25, 0x100, 0x70bd27, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0xe, 0x7}, {0xc, 0xc}, {0xfff3, 0xf}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x3f}, @TCA_RATE={0x6, 0x5, {0x0, 0x3}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x4}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x6}, @TCA_RATE={0x6, 0x5, {0x1, 0x13}}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @TCA_RATE={0x6, 0x5, {0x1, 0x7}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x7}]}, 0x64}, 0x1, 0x0, 0x0, 0xc800}, 0xc000004) ioctl$RTC_PIE_OFF(r1, 0x7006) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x10000, 0x2, 0x0, 0xc, 0x3, 0xffff}, 0x20) 05:11:11 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000340)='.log\x00', 0x40500, 0x100) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000006c0)={'syztnl1\x00', &(0x7f0000000880)={'syztnl0\x00', 0x0, 0x2f, 0x5, 0x5, 0x1, 0x61, @remote, @loopback, 0x40, 0x80, 0x6, 0x6d}}) sendmsg$can_raw(r0, &(0x7f00000009c0)={&(0x7f0000000900)={0x1d, r1}, 0x10, &(0x7f0000000980)={&(0x7f0000000940)=@can={{0x4, 0x1, 0x1, 0x1}, 0x2, 0x2, 0x0, 0x0, "c100"}, 0x10}, 0x1, 0x0, 0x0, 0x8050}, 0x4010) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000380), 0x10, &(0x7f0000000440)={&(0x7f00000003c0)={0x5, 0x18b, 0x1, {}, {}, {0x0, 0x1}, 0x1, @can={{0x1, 0x1}, 0x18, 0x1, 0x0, 0x0, "0c942cf43c8f9e8d"}}, 0x48}, 0x1, 0x0, 0x0, 0x40011}, 0x20004084) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3a) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) r4 = openat$incfs(r2, &(0x7f00000000c0)='.pending_reads\x00', 0x80000, 0x188) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x81, 0xa3, 0x0, 0x0, 0x1, 0x8, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0xfffffffffffffc01, 0xbe}, 0x4846b, 0x1, 0xffff806a, 0x1, 0x3, 0x21, 0x7ff, 0x0, 0x13, 0x0, 0x3}, r3, 0x4, r4, 0xa) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:11 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x0, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:11 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:12 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x7, 0x9, 0x0, 0x0, 0x208, 0x30f7bf5fe80709ac, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x101, 0x7fff}, 0x10, 0x7, 0x1, 0x9, 0x0, 0x0, 0x8, 0x0, 0xfffffffb, 0x0, 0xffff}, 0x0, 0x3, r0, 0x3) 05:11:12 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/52, 0x34}, {&(0x7f00000000c0)}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/255, 0xff}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000600)=""/206, 0xce}], 0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000000c0)={r0, 0x1, 0x100, 0x78e}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000003780), 0x4000, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000003940)={'ip6gre0\x00', &(0x7f00000038c0)={'ip6gre0\x00', 0x0, 0x2, 0x1, 0x3, 0x8, 0x4b, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @empty}, 0x20, 0x10, 0x2, 0x5}}) sendmsg$nl_route_sched(r2, &(0x7f0000003a40)={&(0x7f00000037c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000003a00)={&(0x7f0000003980)=@delqdisc={0x64, 0x25, 0x100, 0x70bd27, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0xe, 0x7}, {0xc, 0xc}, {0xfff3, 0xf}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x3f}, @TCA_RATE={0x6, 0x5, {0x0, 0x3}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x4}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x6}, @TCA_RATE={0x6, 0x5, {0x1, 0x13}}, @TCA_RATE={0x6, 0x5, {0x40, 0x8}}, @TCA_RATE={0x6, 0x5, {0x1, 0x7}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x7}]}, 0x64}, 0x1, 0x0, 0x0, 0xc800}, 0xc000004) ioctl$RTC_PIE_OFF(r1, 0x7006) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x10000, 0x2, 0x0, 0xc, 0x3, 0xffff}, 0x20) 05:11:12 executing program 2: perf_event_open(&(0x7f0000000700)={0x3, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xf}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) clone(0x2010080, &(0x7f0000000040)="5f4f5fca9b8edf43444608dc59aa142b2493f5cd62f9a8c273a2d7a5764b99e9832d6ff9976c4bcf32f9ab3da031a4924f", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000780)="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") r1 = dup(0xffffffffffffffff) lseek(r1, 0x0, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x34, 0x5, 0xa1, 0x40, 0x0, 0xa872, 0x20020, 0x6, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x2, 0x6}, 0x3895e508aa1b7a1a, 0x7, 0x480, 0x7, 0x8, 0x0, 0x75e, 0x0, 0xfffffffc, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0xb) 05:11:13 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d303030303030303030303030303030303030d7303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf60e7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cc9beb10aae14c06f9ec6f8213b414064000000000000009660b4383a00000000000000000f562ce166c782e65efe11e8cf33c134ff97f9300bd5e764b6276b1a8fe77fcbab99fcc0d8eccef51150b2de061000e0b3be5e091407511ae83091bd4774f6082a0eea3b642dddade89f60d9ae98f436617d70679335125b15b5e67a218fff030bc0416ea0a97575e901918b00b97ab0e1954ad0477171c10e52e26d8bff6dba2ff2d776aaeec3bbbcf900403e137ac75cd8ecced64a012e8d6d540353a84c64a55006af41de52674db86063b4cce7ba728caa039c601caebb351a124a1026927868932e05afb3473acc0dc03deb0c9c7cb76c28fa9b51"]) 05:11:13 executing program 2: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1/file0\x00', 0x482d01, 0x80) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0xff, 0x0, 0x3, 0x7f, 0x0, 0x904, 0x0, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000006c0), 0x1}, 0x2002, 0x2, 0x3f, 0x5, 0x9, 0x5, 0xdc26, 0x0, 0x4, 0x0, 0x3}, 0xffffffffffffffff, 0xfff, 0xffffffffffffffff, 0x4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(r0, &(0x7f0000001840)=[{&(0x7f00000003c0)=""/76, 0x4c}, {&(0x7f0000000040)=""/35, 0x23}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/189, 0xbd}, {&(0x7f00000005c0)=""/65, 0x41}, {&(0x7f00000000c0)=""/28, 0x1c}, {&(0x7f0000000640)=""/104, 0x68}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/164, 0xa4}], 0x9, 0x8, 0x6) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:14 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) write$eventfd(r1, 0x0, 0x0) fspick(r1, &(0x7f0000000040)='./file1\x00', 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000005ef40)={0x0, 0x0, "ad481fe97ad4105d578e99a2112f3f57ace03f881ac469b3fb65aa4286f01670f3c3da91fb0a7c069feca611b89b552f67cf1a69cb443a1afa7d6c1043288a3d7b77cee7e9d87ef57599b6056953b9baa4948729a2d8040d299f1b5d466f8856e08817ff7d7296f0c06713469948f3783f35e6590353d07c92e5255e55382da33e029d114182ac13a131d8d68df428a216d9531a768a3518e2a978b8a2d41c2a54783caa51cea5bb0e4e5a4eca7173f3242ee847fcbf2f4cb2858246ba981af3143f16887c52f54675345a0c90d130b0a9d3ea5b37362ae33f3d367bec8a5e3cd94152a849d0966a82f9261ca3cae0a447bcd8a637999ad058e64478fb14bac2", "9c2b9a7cdbbb28551f3d8097203e38335cc32bfe9921f3fd15d9ff8e2638f9bbfd3cbba422d829304272fa624f91accfb9a99f0d68bec4022bed597af4c5cb619e37120b2b156d949ad7d0016d45f5ac973888472b68da07c5baf24c9570727bdb19e8c45e14316d92075085756c938ec25ad485cc442c21d9586e6a12152ae403367b5a6c2ed48cbd3bb24519a2e4e6358afbe9d76140c8cf961f1b1ce8cda6c2e48328b391be152b9716399f4a4a087f04f149e27b8788f24f2d8e0153861b2a1cab6c59f1991b5d8001948b15c6da44f272c6515efd09debd5e2de92e4a5b7181e9db6a8307c7d1dd287ff806269b9170d943688ae1f1a3566813e25bc230460e453b7425728c231428ddc6f5b600764609080ab4234ebd82dffea9fec4b8794961d248ef50159f0b2a948207f9e112719bfd66d7d7632951e3a1500fa19b3cf21e730bd13a05c8233563a3b065fa1d6a04024a21e268af6013f2afb564df276c49e69fb9017c18f4fa49f875b0fb96a0829bbfc4be74f3831dc07939462589cdd6da24b8eb3dd974ae9ed1e23093af47709655ea9ae5d0e6c6efc09170cbcf0e09f05f70174532234fd9c0b06ff6489be8905153ad1c5b9b206c1a27614986f19be10a498fcd213a42a5cd373adf1e7dec28fe3f16f77195ada5d38db2d81cc79e85678237d497d2e50044c38164d1fcb702be14fbc06aa5fa53d37043d1ed60169552b7e52fbc14ca5c3710430a2c063e91edfaa7b947bb2e1cf2060b3f7dc93b4f7d3e0f2fde8eb290a87de81ff0b07445118525cb012969666dc459a12be308067f5ffdf406f43288e80de847d2d58defcbf215b300ddddf779d4a30225b7e7dfbd727702a62ff73331e8e9c0a2536be20892b7165618832182f231ad385245a474e9f401e6ede66d52250800ce28da3f98e9bb172a33efa2639c44cecbc2539cacc27e34bca1e73335b63e0804585534593978dd00256fe54a322c4b0f305f47a482c03f24ab2195d9aeb524a45a776726376b68268fa555baf71b3d159ad85856d2ccd43324dbc747b774e86217b175e7a74b076ab6ee02e81169444955246a937c29275780df999d1d79c2d5deaaf811d93fd77ee9a2ccb0be2c6d26d8739782861604394850ba31b8e15031ef8f8cae7b48edec3cbc9cbef2d85aa1d98bdec9194df7a92aa9616d945feb12042670906050a04b6f0714e3ab3d2f56171002143e7e39c729bba4ed30d519492fbff193e0c03584862ea132f5a0620a0425b3d258a8562280ac05297bd4431fd34fab7c4c4c1e53c98f377cf3c144f2ed9ce610d3ef843a60979253c9966138cfc49dbe8f2b2d95cf9397e9999665754d3ef5ee5bb590d1fb6f675bfb2ec2ec92cc1e0c63f6b4c3426c9ace1fd33ef17a349b20127545ddd52d7637ea8bca8586312d42f1b89cbaf9149c58b88343f66c0810e6ffed7e2aba90aeb25808b2df31e575bd409985c377ecf9c1ff67ffb470bfb442a0a76012c18f7003ea9d4aeb130171d7997e889ae7ed2348e491fd17d075f60fe54fdfbfd23c015f4057aa5658db4af2c4d9b79ca47e7cd2b0654c4c299a782875900db515cc3f2527b56a3594a9fefdbcf7c6f4f646adaaf86f52e3847e3d30a2109fc43616d61e1b1591137e493638f824aa808be61ac9831dff2627dace0a7940531385527844653b941a7fdd67d82686f06118581067f7ccbc181faf820f3591d15d8c03c57fd25a38b8e0304787a5720ba9541df15a8ca96614313741070164dda2aaafbec0d71fa267ccb9cc85dc29a078cc7791137cb9568dd823ddefc125743ea22c495296c1879c4ca0624a5edceea3999fdbe1dfa318e33f798af87e80bd31e40dc5a777240b592bd8e6ebad09cdf0b7164a671e28b3e5c36b5744a36db1ac75ae34dbbccdf415c8455d9e5becba96aed42413c885a0ff7ac36fc61cec31377b3e1b9a4c723a2af622ac52674d0ff758e27cfd5195dc42a92c2c8513c1300e44b078668b48a14272112db8788ffddb80d2d5c9f675b66b9f5d124f85efced529ed53ae286e30044d986a2e5b1a8bc31a993523819492ab2b81f1a6575f4e1a1dbc45413c1115ebd7114263d06a15578b2e35ba2035643cdd9402a030fb948b555a466d2ecfc83a64ddb38d5420b7a631e12cb2821b129003b2ca9f746064000f5ecb5baaddf1265175e16d1befbb44d23915e3e9fc36d4db418fbdffefaee91201fad60fa28faab05d85edef3244ff9d7fdce57bb616858ec7f9f960f2e6a21e2d4e34f3e9ae3a16f1ae49fc4027aac11107ec5e00c3601dd92c5c8bd91674275d877c1b7b65d2e5ef81b060a1afa82475001b014c26abeaaa644df9c85fd086c8e5679a9c80ef431a04c5039c5b18fc68f85cf7886071b868201208574fd01882321620a1cc0f47e94fd7293d8c7353a5c0031375ba599ec6c0e0be69d0a18f59bf5cd9ebca2655297ead9d1d534460ca663db08ff49a6a1541e5736f2e4c6e614c50cfb148e28614ccfbc5da7b20726f24c98a2df6f01432e72dcda7333cf8a92591ed1636916d6b8bf02665c27d5820c6c22766f511d5d38516feec4c474797b8e73d21b5170522c9342f0b980306045b868076b7c1e1f1658751ccd5eeaf5c3fb3051e1de23f5b4cd522016bb21aaf41caee4a76865df4e1706e717ec9d70a649daee69c10017f238b39797caf14023e6720345ea44b6fe7ff311dd294b6ea1d773f0ca65184d0961256c7b816e7d030038f4e81445b9b5fa732b549d1c63144b529eb9d29b715077cffc2eefea53d95fb9bc1a046d2b6b06cc45a7507b16f400d764e9fb17b4b18282dcd6028830b5610f2b52e735381ae926ece2c98f5d830f18651d266ab97cdb974704baf1e442a43c6861ce73f996452ea93afa40ec51e4c38ba3143887f614347596a4dd62ecda7257fc261135f11e24f747fdf399d6103d43c52cd22183656801344d7767c51d91ca15e93ab07c2f930c497ee5d4d718a5648b01b9e957ebaa7097307cfdb0ec2cf17ae20940afbc13587017a11e60aeba7df71c7fc3e61fc5f29b55003eced4d99e4bb7852903d237ae7638fb10fd94e09b0de0e02d15dd632751d701392d0982d559234187dc9f7043c69d744350523ed3d88983509e45be759600ae3cd1ea3b5ed4cbb02e37292551537155b2cbab176019385365367100d74039a7cb18a41599df9895cdf9812f08d9ee7f06972f1ac72a4718e5746b22ecae62900ee35287ae6c38acfccaad611c4416331515a4be4929563d18f708d8f7606034acfc931c2f314d00949601fac17fbfaa7958ba692f0a6178b920cae00a3b9e0a9a0db1292c8d7bce263fdaac6af5fb339c3cd218b6583e5a7780387d4abe40a5d8116fcb74c38c44d86c24c61da466bb0f46cfbd805a91c8c20fa2126f8045a9bd7a932529df1469b825560e8ab71fce7bbd42a6f4efcc09a1bc46c2f13ea6a940c9559c4c072c0006758afa30763cccc5346d5b74b38d28f6552ecf870ee84878500f36d63c4e68d167a53cc66233715476bcc8952fe4d3b266eab0cd2c54b179993dae5d4a5dff51e53982ee008b9849a28ca4effef7d5af2f1eed9a8a385b7206d02402eb7ff0dedff7868789bad5a45a35f13180f7a9fd648a998ffc2e6a0c64cf60c85d9671a81fb35e8057eb8728bdc407f61a48f1b22718ded0c407f05fea67d5bc063fa983a247b7d2d3baeb9da926164652f8354b01d721b115e7ef7640694a7a84cc37e0ccbed1b8450f3cf7bce4fb6e990c144aec909a6cc281c9a7d9b927b9a67bd7b9d024a96a6d73ef7fcda7d6fa46b135fd2d9d5742d83e8793995f1cccee2a8c85d15f431c70147b70596eca174db10557e2100b8160e32a7da1515ed656ccddc8a268874faea006a9171a8d3de2bc124ef12d97d82b72623039504b145ca50dd7849e9926f62765af1e89d8bc4e3a7b152f5850d4b511b4c54335620e03407fb24eaf62a4380e7babd445a40c8c6ec09f149e7d2c8827e7b79e8594d60d3125d11699ebed0151d135a77c2f79f0b0fbb819109a9eb9ffb69fccc36dd79eb006fb434611b8bf330e878f053f00032f252deed534563563c9cee020c4827efff50fe872f365c758fcf51afeb273c0c1d52ef995a6422879bc299ad9042cbba990aa4ce7621a1c7cfb226242e8321b1f34f874c03ee4f8681dfd20e6d4646614e775c7d9f84d3e0bcab475a20564fb48920cbe4eaa016d15fc9ce014e38da39289717cb83daff82bf2714d6ed1b9782f8edd7ac4d80795485d713c4c346c425c644794ffb85ef7e9fe2f72e0553ae06656ba2e579fd7cd9f683f04aac5dfd84e30f0a01988d70181d6f922aeaa158b3c36d4d11e36619c8076dbbb1b2be05ae53038444164df6ff98c6e64571ac4bad0f39ccbc7570841b2db7a7355d979c7f002e0e19c0eab1a5239592c71b36ccf745f361a20e0abe11ab51567a3081a7003fdf515755cbe010b182404e162557a18fd599a81f2ff84216551c48bc7000a3269f4e24825fe2dbfa269fd92df2e75ad6bb7b32bb836220ccce58a380efe71b4a2d7303c9302afe3f5b713472d275c9b6ff95ce98b1e252d721b1db01c8a3123395ecb9006ef009a0db971db838c99c7dd661217250021c1c3dc3a751888354fd95ef2242f357b74c82b2913368b1d885991d4fc32808d7f7d878e8fad43556cec281971640ffc491fc1adcec20380eda62300abaae9ca3c0f884a8184f0d258f4e93d585de51193398de638491e9c7d342165dc298051d229b5cebf7b6779b8b8783b64fe5d2fa761ea044c0217a4430532394270c3bcdf178c8e9e7fc6ad4f26ade57cd528aa6cb6996b1bbf948940a3028382a1d4e5f8b2b6a999b76f86affa13f3767ef44165670cdde3f5b7b105fa83157cd6dffde44f7f3d5b6a6dde7c98af0dd4d4776930945beab948021d96d281bc6482c87679b2e5d7e7c9ac27419b586c505f527712229d09c033dd5c165222f461e23f68ccc3a89285f83f262a622a5d7431317d2ce4261f12a733976a385e2f3109279d9971e9020d779caff50e116bdd49709c5823f32983f4a89bf779aa76b372d115f8d5ffd6815c75a60a5f22db4e4b9305ccbd4cf72c3afd1061267fae056fe32d7f1475da1a949b7b00b4d9211e2b116a4ff1aca613ea5bddc062d6dfcb3cbbfc97d66684ca1bda55d533a54bb219724593d83a3b28b3faf2e413f7bc1bee61b9113871a486fc0a89c978e753e86201ce6257271db45e62308a3cb5eb4a8eb0b71cefda52a75dbdb7c3e6dc1f1427f122273d7be0e0b829d23db2a2dffe70c5822e560c0ef2d3c8160b8bf807092293d39e9db7c74a3d43b514ab25da6f4fe383dc73e718c0d03e1fb60b347b2a601fef0b26b13b61a47dec9"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000005ff40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004fa80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000e00)={r4, 0x0, "3c6e59ec1f02cc9d5f42ed04e460876173e09d83853cee87748ea329cfddee467ce68779910ced8ae5c511fa5f8c29b30ea55fe8bbcb916b676b81987d8f740f449dcaeb54d8fd714d5b36708bad118f246a9f407a800884e8c825d7b55576775fe932ea16ce00d29ba023ab1ed7a86d450e4f330bba87c3a8fd3ed55e765b03dbd07e5c218be2e9fe1c54ffc4237d9224844b569231d9c2f19d4ffee6c0e1a3aba603466afa4d7a3cb539d1105fbb235048844f8554a09679be232460e67a858f1f99b2c5377ee3c38b6357fcf9d08dc7a4a77716e01315ebc91836c147498a3f5a42006e91084bb77ee8de4128ead12be37b4ba8e786782a1dd374408a2592", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041840)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0xfc, "89c6bc235d5048"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000060f40)={{0x0, 0xffffffffffffff5b, 0x9, 0xc2, 0xfffffffffffffff8, 0x2, 0xdae, 0x4, 0x1, 0xea66, 0x1, 0x6, 0xd63e, 0x401, 0x7}, 0x48, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004fa80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000e00)={r6, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000041840)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0xfc, "89c6bc235d5048"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000061000)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {0x0, r3}, {0x0, r4}, {r5, r6}], 0xfe, "1b83d79797fbbf"}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x6, 0x80, 0x20, 0x0, 0x8, 0x810, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xf81, 0x0, @perf_config_ext={0xda, 0x2}, 0x20, 0x100, 0x8001, 0x5, 0x9, 0x0, 0x9, 0x0, 0x1, 0x0, 0x3}, r1, 0x6, 0xffffffffffffffff, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000400)={r0}) ioctl$IMGETCOUNT(r2, 0x80044943, &(0x7f0000000440)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="3030303030303030303030303030bfb730d9250dd629303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be0bc5f8def4215b0d40599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) 05:11:14 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:15 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:15 executing program 0: creat(&(0x7f0000000040)='./file1\x00', 0x2) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) r1 = dup(0xffffffffffffffff) write$eventfd(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x2, 0x2, 0x3f, 0x0, 0x7fff, 0x80007, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x828f5fb1d897e566, @perf_bp={&(0x7f0000000080), 0x8}, 0x1100, 0x1, 0x7, 0x4, 0x9, 0x7, 0x20, 0x0, 0xd1, 0x0, 0x1e}, 0xffffffffffffffff, 0x1, r1, 0xb) 05:11:15 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000000040)={r2}) 05:11:16 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000000040)={r2}) 05:11:16 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/211, 0xd3}, {&(0x7f00000002c0)=""/56, 0x38}], 0x2, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}, 0x40000000) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x9, 0x10, r1, 0x58e16000) r2 = syz_open_dev$vcsu(&(0x7f00000000c0), 0xfffffffffffffffa, 0x6000) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x80, 0x1f, 0x8, 0x81, 0x1, 0x0, 0x4, 0x1b708, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x51a0, 0x4, @perf_config_ext={0x1479, 0x5}, 0x10010, 0x0, 0x7, 0x5, 0x80000000, 0x8, 0x800, 0x0, 0xfff}, r0, 0x3, r2, 0x14) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:16 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) r2 = getpgid(0xffffffffffffffff) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x143400, 0x0) mmap(&(0x7f000079a000/0x3000)=nil, 0x3000, 0x2000001, 0x1010, r0, 0xf1685000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x80, 0xff, 0x81, 0x1, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x100, 0x4, @perf_config_ext={0x9, 0x80000000}, 0x8001, 0x9, 0x1f, 0x9, 0x2, 0x101, 0x5f, 0x0, 0x2, 0x0, 0xff}, r2, 0x9, r3, 0x9) 05:11:17 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:18 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d303030303030303030303030303030303030d7303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf60e7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cc9beb10aae14c06f9ec6f8213b414064000000000000009660b4383a00000000000000000f562ce166c782e65efe11e8cf33c134ff97f9300bd5e764b6276b1a8fe77fcbab99fcc0d8eccef51150b2de061000e0b3be5e091407511ae83091bd4774f6082a0eea3b642dddade89f60d9ae98f436617d70679335125b15b5e67a218fff030bc0416ea0a97575e901918b00b97ab0e1954ad0477171c10e52e26d8bff6dba2ff2d776aaeec3bbbcf900403e137ac75cd8ecced64a012e8d6d540353a84c64a55006af41de52674db86063b4cce7ba728caa039c601caebb351a124a1026927868932e05afb3473acc0dc03deb0c9c7cb76c28fa9b51"]) 05:11:18 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:18 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:19 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000000040)={r2}) 05:11:19 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:20 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:20 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[]) poll(0x0, 0x0, 0x1ff) [ 746.811641][ T1194] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.818034][ T1194] ieee802154 phy1 wpan1: encryption failed: -22 05:11:20 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d303030303030303030303030303030303030d7303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf60e7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cc9beb10aae14c06f9ec6f8213b414064000000000000009660b4383a00000000000000000f562ce166c782e65efe11e8cf33c134ff97f9300bd5e764b6276b1a8fe77fcbab99fcc0d8eccef51150b2de061000e0b3be5e091407511ae83091bd4774f6082a0eea3b642dddade89f60d9ae98f436617d70679335125b15b5e67a218fff030bc0416ea0a97575e901918b00b97ab0e1954ad0477171c10e52e26d8bff6dba2ff2d776aaeec3bbbcf900403e137ac75cd8ecced64a012e8d6d540353a84c64a55006af41de52674db86063b4cce7ba728caa039c601caebb351a124a1026927868932e05afb3473acc0dc03deb0c9c7cb76c28fa9b51"]) 05:11:21 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7c6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:11:21 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) syz_io_uring_setup(0x884, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d3000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_ASYNC_CANCEL={0xe, 0x1}, 0x7) r3 = socket$rxrpc(0x21, 0x2, 0xa) syz_io_uring_submit(r1, r2, &(0x7f0000000400)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x10}}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r4, 0x29, 0x18, 0x0, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000900)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f00000008c0)={&(0x7f00000006c0)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000000400)=[{0xffffffffffffffff}, {&(0x7f0000000740)=""/131, 0x83}], 0x2, &(0x7f0000000800)=""/175, 0xaf}, 0x0, 0x0, 0x0, {0x2, r5}}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000040)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x3, 0x0, r0, 0x0, &(0x7f0000000140)="2a41f5707bd68a0b44a5e12cb7b2f9e171165da94c06d8ceaeacd13a3a4141194def64caf5e5bd33be993a2e198eb6e7041423bee00e3f75efc5a69fe997060270211fccefb317fb209063130f2cac4e70416fab3ee524679cb8399c7b2e18af3fb02c4491b51431c706f9b33f93a68f830bda7aa4e3f3859a02be5eb4f32980b3ed755028323b5cdac75e2a96f97887933763867d9221326e46d479dec0d802572a02ab0524d1f05e1215dcf468e80dcb0f6dc813f2dacce98acd5675a72b6456da254d8b8016fbcda471f2c40b37bc8b43b54f3543f8df2c8b354a9bd6317f799765156ffa2502d060cc46164646d568d14da932f3637693a9f1", 0xfb, 0x0, 0x0, {0x0, r5}}, 0x5dd2) 05:11:21 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x800, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000100)=0x8000, 0x4) 05:11:22 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) write$eventfd(r0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3a) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1, 0x1, 0x7f, 0x7f, 0x0, 0x0, 0x811, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x1}, 0x10000, 0x80000000, 0x0, 0x0, 0x838, 0x81, 0x200, 0x0, 0x42a3, 0x0, 0x1}, r2, 0x7, r0, 0x3) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:22 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x280000b, 0x12, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000600), 0x490000, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000640)=0x4000, 0x4) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657fb7c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193259400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f48269261abb2cddc681494b1af7005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b4140a20b654080b21e9431d4772440bfe3eb80aacf3262"]) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000400)=0x0) r4 = dup(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000680)={'ip6tnl0\x00'}) lseek(r4, 0x0, 0x3) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x6, 0x9, 0xfa, 0x7, 0x0, 0x8000, 0x20, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x1ff}, 0x2, 0xffffffff, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x7fff}, r3, 0xc, r4, 0x2) execveat(r0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0)=[&(0x7f0000000080)='..:\xad*],)$]\x00', &(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='vfat\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='-Q&,\x04\x00'], 0x100) poll(0x0, 0x0, 0x1ff) 05:11:22 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaa7e6, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x5}}]}}]}, 0x48}}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c000200180002000300000005000000000000000000000000000000576731bb730f09a03365e41099ece29a87e2228352d705f11fd6c4075aced0247de600a8fbdebdc0e900"/103], 0x48}}, 0x0) r5 = socket(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x5}}]}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=@ipv6_delroute={0x19c, 0x19, 0x200, 0x4, 0x25dfdbfe, {0xa, 0x80, 0x80, 0x0, 0xfc, 0x4, 0xc8, 0x9, 0x500}, [@RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @SEG6_LOCAL_NH6={0x14, 0x5, @local}}, @RTA_EXPIRES={0x8, 0x17, 0x8}, @RTA_METRICS={0xd7, 0x8, 0x0, 0x1, "c558b484992ae01cacb22a94bc2ee0e4eed6edec7c6504dd252b557b85dd4c9c2ded5cd686d046f65ab9b31c430fc5dcfd5e867afc95021d261e35a159d51ef25fda7e6898db964eb5497e13126245f02d2e11336a148b2042600c738aca977e11a28fcf61dc73ae526b673e7cf823c45e46bd747e635bccb66af06d616bd0be1a3c5d651c88a8c375a5df1ebfd29f0363352a65f825c007b50ea799a561fe0703086ee8dccc9ff152bbfcb06b05d96c31bd39cf4e06b1340bb4250df444ede9bfe41224b57a7ac752d10ab2f93f16675b15d7"}, @RTA_OIF={0x8}, @RTA_UID={0x8, 0x19, r1}, @RTA_METRICS={0x5e, 0x8, 0x0, 0x1, "9f03e651b949b2db042f6441f23123e01b33f723c83438881420f35babd836374f78802738507a9be1cde1020d76c41c834a3cc08e101c869a794fd41790ad498f05a0fc1c7bfef24a8535a3e2fee8043cbddf8d76fb613d385d"}, @RTA_IIF={0x8}, @RTA_IIF={0x8, 0x3, r4}, @RTA_IIF={0x8, 0x3, r7}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4040041}, 0x8800) statx(r0, &(0x7f0000000080)='./file1\x00', 0x6000, 0x1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file1\x00', r1, r8) poll(0x0, 0x0, 0x1ff) 05:11:22 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:22 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/600]) poll(0x0, 0x0, 0x1ff) 05:11:23 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) r1 = dup(0xffffffffffffffff) write$eventfd(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x3d31cf9565082df5, 0x80, 0x74, 0x9, 0x40, 0x7f, 0x0, 0x0, 0x32801, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x80, 0x1, 0x8, 0x4, 0xffffffff, 0x7, 0x0, 0x74a7, 0x0, 0x5}, 0xffffffffffffffff, 0xd, r1, 0x2) poll(0x0, 0x0, 0x1ff) 05:11:23 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x280000b, 0x12, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000600), 0x490000, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000640)=0x4000, 0x4) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000400)=0x0) r4 = dup(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000680)={'ip6tnl0\x00'}) lseek(r4, 0x0, 0x3) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x6, 0x9, 0xfa, 0x7, 0x0, 0x8000, 0x20, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x1ff}, 0x2, 0xffffffff, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x7fff}, r3, 0xc, r4, 0x2) execveat(r0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0)=[&(0x7f0000000080)='..:\xad*],)$]\x00', &(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='vfat\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='-Q&,\x04\x00'], 0x100) poll(0x0, 0x0, 0x1ff) 05:11:24 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaa7e6, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x5}}]}}]}, 0x48}}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c000200180002000300000005000000000000000000000000000000576731bb730f09a03365e41099ece29a87e2228352d705f11fd6c4075aced0247de600a8fbdebdc0e900"/103], 0x48}}, 0x0) r5 = socket(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x5}}]}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=@ipv6_delroute={0x19c, 0x19, 0x200, 0x4, 0x25dfdbfe, {0xa, 0x80, 0x80, 0x0, 0xfc, 0x4, 0xc8, 0x9, 0x500}, [@RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @SEG6_LOCAL_NH6={0x14, 0x5, @local}}, @RTA_EXPIRES={0x8, 0x17, 0x8}, @RTA_METRICS={0xd7, 0x8, 0x0, 0x1, "c558b484992ae01cacb22a94bc2ee0e4eed6edec7c6504dd252b557b85dd4c9c2ded5cd686d046f65ab9b31c430fc5dcfd5e867afc95021d261e35a159d51ef25fda7e6898db964eb5497e13126245f02d2e11336a148b2042600c738aca977e11a28fcf61dc73ae526b673e7cf823c45e46bd747e635bccb66af06d616bd0be1a3c5d651c88a8c375a5df1ebfd29f0363352a65f825c007b50ea799a561fe0703086ee8dccc9ff152bbfcb06b05d96c31bd39cf4e06b1340bb4250df444ede9bfe41224b57a7ac752d10ab2f93f16675b15d7"}, @RTA_OIF={0x8}, @RTA_UID={0x8, 0x19, r1}, @RTA_METRICS={0x5e, 0x8, 0x0, 0x1, "9f03e651b949b2db042f6441f23123e01b33f723c83438881420f35babd836374f78802738507a9be1cde1020d76c41c834a3cc08e101c869a794fd41790ad498f05a0fc1c7bfef24a8535a3e2fee8043cbddf8d76fb613d385d"}, @RTA_IIF={0x8}, @RTA_IIF={0x8, 0x3, r4}, @RTA_IIF={0x8, 0x3, r7}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4040041}, 0x8800) statx(r0, &(0x7f0000000080)='./file1\x00', 0x6000, 0x1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file1\x00', r1, r8) poll(0x0, 0x0, 0x1ff) 05:11:24 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:24 executing program 2: r0 = syz_open_dev$audion(&(0x7f00000001c0), 0x7f, 0x400600) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000ab43fde9d48623ec", @ANYRES32=r3, @ANYBLOB="000020000000000024001200140001006272696467655f736c617665000000000c000500080005"], 0x3}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@newneigh={0x24, 0x1c, 0x800, 0x70bd2c, 0x25dfdbfc, {0x1c, 0x0, 0x0, r3, 0x80, 0x8, 0x8}, [@NDA_VNI={0x8, 0x7, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x20008010) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) r4 = dup(0xffffffffffffffff) write$eventfd(r4, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x5, 0x80, 0x1f, 0x9, 0x6, 0x3, 0x0, 0x2, 0x80590, 0xd, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x43f8, 0x4, @perf_bp={&(0x7f0000000200), 0x8}, 0x2000, 0x400, 0x6, 0x2, 0x9, 0xff, 0x8d, 0x0, 0x8, 0x0, 0x5}, r4, 0x0, r1, 0x5) poll(0x0, 0x0, 0x1ff) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000780)={0x0, 0xcd, @status={[0x914, 0x1, 0x40, 0x200, 0x5, 0x8]}, [0x1f, 0x6, 0x7fffffff, 0x0, 0x40, 0x9, 0x18000000, 0x6, 0x92b, 0x0, 0xfffffffffffffffa, 0x10001, 0xfffffffffffffff8, 0x100, 0x400, 0x7, 0x2, 0x37, 0x4, 0xf, 0x4, 0xfffffffffffffffd, 0x6, 0x6, 0x1f, 0x1000000000, 0x40, 0x9, 0x1, 0x80, 0x4, 0x9, 0x1000, 0x49d9, 0x2, 0x4000000000000, 0x9, 0x465a1476, 0x1, 0xffffffffffff1013, 0x0, 0x380000000000000, 0x0, 0x9, 0x1, 0x2e, 0x3, 0x9, 0x0, 0x8, 0x8, 0x29bd, 0x93c, 0x7, 0x40, 0x3f, 0x401, 0x7, 0x8, 0x0, 0x9, 0xca70, 0xfffffffffffffc01]}) 05:11:25 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x0) renameat2(r1, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000140)='./file1\x00', 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c0037877884b06055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff2927500bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720d376ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000ecff00000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:11:25 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaa7e6, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x5}}]}}]}, 0x48}}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c000200180002000300000005000000000000000000000000000000576731bb730f09a03365e41099ece29a87e2228352d705f11fd6c4075aced0247de600a8fbdebdc0e900"/103], 0x48}}, 0x0) r5 = socket(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x5}}]}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=@ipv6_delroute={0x19c, 0x19, 0x200, 0x4, 0x25dfdbfe, {0xa, 0x80, 0x80, 0x0, 0xfc, 0x4, 0xc8, 0x9, 0x500}, [@RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @SEG6_LOCAL_NH6={0x14, 0x5, @local}}, @RTA_EXPIRES={0x8, 0x17, 0x8}, @RTA_METRICS={0xd7, 0x8, 0x0, 0x1, "c558b484992ae01cacb22a94bc2ee0e4eed6edec7c6504dd252b557b85dd4c9c2ded5cd686d046f65ab9b31c430fc5dcfd5e867afc95021d261e35a159d51ef25fda7e6898db964eb5497e13126245f02d2e11336a148b2042600c738aca977e11a28fcf61dc73ae526b673e7cf823c45e46bd747e635bccb66af06d616bd0be1a3c5d651c88a8c375a5df1ebfd29f0363352a65f825c007b50ea799a561fe0703086ee8dccc9ff152bbfcb06b05d96c31bd39cf4e06b1340bb4250df444ede9bfe41224b57a7ac752d10ab2f93f16675b15d7"}, @RTA_OIF={0x8}, @RTA_UID={0x8, 0x19, r1}, @RTA_METRICS={0x5e, 0x8, 0x0, 0x1, "9f03e651b949b2db042f6441f23123e01b33f723c83438881420f35babd836374f78802738507a9be1cde1020d76c41c834a3cc08e101c869a794fd41790ad498f05a0fc1c7bfef24a8535a3e2fee8043cbddf8d76fb613d385d"}, @RTA_IIF={0x8}, @RTA_IIF={0x8, 0x3, r4}, @RTA_IIF={0x8, 0x3, r7}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4040041}, 0x8800) statx(r0, &(0x7f0000000080)='./file1\x00', 0x6000, 0x1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file1\x00', r1, r8) poll(0x0, 0x0, 0x1ff) 05:11:25 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x280000b, 0x12, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000600), 0x490000, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000640)=0x4000, 0x4) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000400)=0x0) r4 = dup(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000680)={'ip6tnl0\x00'}) lseek(r4, 0x0, 0x3) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x6, 0x9, 0xfa, 0x7, 0x0, 0x8000, 0x20, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x1ff}, 0x2, 0xffffffff, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x7fff}, r3, 0xc, r4, 0x2) execveat(r0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0)=[&(0x7f0000000080)='..:\xad*],)$]\x00', &(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='vfat\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='-Q&,\x04\x00'], 0x100) poll(0x0, 0x0, 0x1ff) 05:11:26 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040), 0x2c000, 0x0) pread64(r0, &(0x7f0000000780)=""/4096, 0x1000, 0x7) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:11:26 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:26 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8231a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x402, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:27 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r2 = openat$sysctl(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/mm/ksm/run\x00', 0x1, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000380)=0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x2, 0x3f, 0x5d, 0x4, 0x0, 0x4, 0x4820, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000002c0), 0x2}, 0x4200, 0x8, 0xc8a, 0x6, 0x4, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4000000}, r3, 0xffffffffffffffff, r1, 0x1) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000200)={{r2}, 0x3, 0x6, 0x3}) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f0000000100), 0x4) mmap(&(0x7f0000422000/0x3000)=nil, 0x3000, 0x2000005, 0x110, r4, 0x8d514000) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140), 0x4000) poll(0x0, 0x0, 0x1ff) pipe2(&(0x7f0000000280), 0x0) 05:11:28 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff, r0}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:29 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:29 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(0xffffffffffffffff, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:29 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_ASYNC_CANCEL={0xe, 0x1}, 0x7) r1 = socket$rxrpc(0x21, 0x2, 0xa) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r1, 0x0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x10}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_READ_FIXED={0x4, 0x1, 0x2007, @fd=r0, 0x4, 0x1ff, 0x42, 0x0, 0x0, {0x1}}, 0x7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000240)={0x0, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000001880)={&(0x7f00000002c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast2}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)=""/21, 0x15}, {&(0x7f0000000600)=""/238, 0xee}, {&(0x7f0000000780)=""/245, 0xf5}, {&(0x7f0000000380)=""/93, 0x5d}], 0x4, &(0x7f0000000880)=""/4096, 0x1000}, 0x2042) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2000200, &(0x7f0000003bc0)="5b383e32679df51fac1616d61e4aecbee88f70bde7ee6d68dfd1c61818d87292121644d0a6e855087cedba8350f6709504bba9ac03e5e3f6c8f733209cd42f55685022d7034b74351952ba9ae1fc2965dd30299e26187cbb01b07af1139a0ecbbf1839d190cbfa09778ebbf56f9d79d4cdc38c4debf79194a26cc4238dc65ccb1df87240d7a9b17c3a3402be831e85b93ca8c1a7bf8f5b2ef4d7a4725222", &(0x7f00000001c0), &(0x7f0000000180), &(0x7f0000003a00)="ab83b3f8218f79dd30255fcfdd82d7612a1b70c45f6a6a8a6756dd030e83b6c6f6a8638918eb4e130d76b062a68498970e72683cec381895f9768c82fe53fef97cf488fa7b7bea1a85115f78e8b1900de0ee482ca11766560001d48249c7f6e3a26ecc34f51edee1fdf0e2918a046df2e4339d73cb79030ed64fb18bb8eb91ffbcc8e705a4e1e5d532998654c8cdf88f02a90ad941c24eeb9de7a65a43f866f51bf79145c178e7be35cc7659009e67d1f10b803e9911fbf8d4bc4e679a9cc573ad093b4751df52bab1403f96c7fd12fd25bc3e72276dca1585a059c112160fc956f4e6c01dd610462e03000000f4ff00"/252) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) ptrace$setopts(0x4206, 0x0, 0x4, 0x20) poll(0x0, 0x0, 0x1ff) read$FUSE(r2, &(0x7f00000018c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ptrace$setregs(0xf, r4, 0x8, &(0x7f0000003900)="974b2b0ae7011ff073c68fddb5f48a7fe8c527cc13f79992fcbfbd6d79c9410e3e9dcdd11eb9e1467905c6f0d825b473a422eb087369c84774b24e6a78789a76bdd694175caa8fc88258938ec376d85c51a93dd026a79022d93b564c2d7c341caba01d72afc7b56453ca94eaddfc093673b507ca1fd1c42285e413174ec840ca6bf9121ee3db0df5d77c42d744c1d482677ea0d93756c68835ca5192e3c6fc9af0e7db222d0caa080242db623551da6955c0ef2134dfc004826bfa504b3f533a880175044634a01fdab35de15d7853f6a99d13fccd1a90d31651b7b6ee9c4e29") 05:11:30 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:11:30 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff, r0}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:31 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:32 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r0, &(0x7f0000002540)=[{&(0x7f00000037c0)=""/4109, 0x100d}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000002400)=""/18, 0x12}, {&(0x7f0000000400)=""/67, 0x43}, {&(0x7f0000002440)=""/240, 0xf0}], 0x5, 0x7233, 0x200) r1 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000480)={0xff, 0x16a8, 0x4, 0x2, 0x3}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYRESOCT]) poll(0x0, 0x0, 0x1ff) open(&(0x7f0000002680)='./file1\x00', 0x200, 0xb0) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000002600)={0x5, 0x80, 0x2, 0x21, 0xb2, 0x2, 0x0, 0x6, 0x100, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f00000025c0), 0x9}, 0x100, 0x1, 0x4, 0x3, 0x10000, 0x4, 0x8, 0x0, 0x7, 0x0, 0x6}, r2, 0x9, r1, 0x1) 05:11:32 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(0xffffffffffffffff, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:32 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff, r0}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:32 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11512, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x18, 0x0, 0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000900)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r1, 0x0, &(0x7f00000008c0)={&(0x7f00000006c0)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000000400)=[{0xffffffffffffffff}, {&(0x7f0000000740)=""/131, 0x83}], 0x2, &(0x7f0000000800)=""/175, 0xaf}, 0x0, 0x0, 0x0, {0x2, r2}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index=0x9, 0x80000000, 0x2, 0x3, 0xa, 0x1, {0x2, r2}}, 0x6) r3 = syz_open_dev$vcsn(&(0x7f0000000080), 0x20, 0x40a000) ioctl$VIDIOC_S_TUNER(r3, 0x4054561e, &(0x7f0000000140)={0x5, "ee5be0a7cc209c7effe7b9cce9774278b50188ef0726c9f2cfb04843db62d656", 0xc9f4ed0653e5d830, 0x100, 0xffffff01, 0x5, 0x4, 0x4, 0x1, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='/((\x00') clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:33 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x60, 0x48, 0x3, 0x80, 0x0, 0x4, 0x40001, 0x5, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000040)}, 0x8024, 0xff, 0x6, 0x5, 0x1, 0xffffffff, 0x6, 0x0, 0x1, 0x0, 0x5}, r0, 0x4, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x40, 0x4, 0x3f, 0x5, 0x0, 0x2, 0x8000, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51d9, 0x1, @perf_config_ext={0x6, 0x8000}, 0xa000, 0x3f, 0x0, 0x6, 0x5, 0x10000, 0x1000, 0x0, 0x4}, r1, 0x0, 0xffffffffffffffff, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:33 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:33 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x82c02, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000180)={0xa20000, 0x80000, 0xc03f, r1, 0x0, &(0x7f0000000140)={0xa00902, 0x6, '\x00', @value=0x1ff}}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:34 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(0xffffffffffffffff, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:34 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:34 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_ASYNC_CANCEL={0xe, 0x1}, 0x7) r1 = socket$rxrpc(0x21, 0x2, 0xa) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r1, 0x0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x10}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_READ_FIXED={0x4, 0x1, 0x2007, @fd=r0, 0x4, 0x1ff, 0x42, 0x0, 0x0, {0x1}}, 0x7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000240)={0x0, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000001880)={&(0x7f00000002c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast2}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)=""/21, 0x15}, {&(0x7f0000000600)=""/238, 0xee}, {&(0x7f0000000780)=""/245, 0xf5}, {&(0x7f0000000380)=""/93, 0x5d}], 0x4, &(0x7f0000000880)=""/4096, 0x1000}, 0x2042) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2000200, &(0x7f0000003bc0)="5b383e32679df51fac1616d61e4aecbee88f70bde7ee6d68dfd1c61818d87292121644d0a6e855087cedba8350f6709504bba9ac03e5e3f6c8f733209cd42f55685022d7034b74351952ba9ae1fc2965dd30299e26187cbb01b07af1139a0ecbbf1839d190cbfa09778ebbf56f9d79d4cdc38c4debf79194a26cc4238dc65ccb1df87240d7a9b17c3a3402be831e85b93ca8c1a7bf8f5b2ef4d7a4725222", &(0x7f00000001c0), &(0x7f0000000180), &(0x7f0000003a00)="ab83b3f8218f79dd30255fcfdd82d7612a1b70c45f6a6a8a6756dd030e83b6c6f6a8638918eb4e130d76b062a68498970e72683cec381895f9768c82fe53fef97cf488fa7b7bea1a85115f78e8b1900de0ee482ca11766560001d48249c7f6e3a26ecc34f51edee1fdf0e2918a046df2e4339d73cb79030ed64fb18bb8eb91ffbcc8e705a4e1e5d532998654c8cdf88f02a90ad941c24eeb9de7a65a43f866f51bf79145c178e7be35cc7659009e67d1f10b803e9911fbf8d4bc4e679a9cc573ad093b4751df52bab1403f96c7fd12fd25bc3e72276dca1585a059c112160fc956f4e6c01dd610462e03000000f4ff00"/252) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) ptrace$setopts(0x4206, 0x0, 0x4, 0x20) poll(0x0, 0x0, 0x1ff) read$FUSE(r2, &(0x7f00000018c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ptrace$setregs(0xf, r4, 0x8, &(0x7f0000003900)="974b2b0ae7011ff073c68fddb5f48a7fe8c527cc13f79992fcbfbd6d79c9410e3e9dcdd11eb9e1467905c6f0d825b473a422eb087369c84774b24e6a78789a76bdd694175caa8fc88258938ec376d85c51a93dd026a79022d93b564c2d7c341caba01d72afc7b56453ca94eaddfc093673b507ca1fd1c42285e413174ec840ca6bf9121ee3db0df5d77c42d744c1d482677ea0d93756c68835ca5192e3c6fc9af0e7db222d0caa080242db623551da6955c0ef2134dfc004826bfa504b3f533a880175044634a01fdab35de15d7853f6a99d13fccd1a90d31651b7b6ee9c4e29") 05:11:34 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x2408, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:34 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff, r0}, 0x78) poll(0x0, 0x0, 0x1ff) 05:11:35 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff, r0}, 0x78) poll(0x0, 0x0, 0x1ff) 05:11:36 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x2042, 0x40) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = dup(0xffffffffffffffff) lseek(r1, 0x0, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x42400) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:36 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0xbd3f7dc128d0fdde, 0x80, 0x1, 0x1f, 0x20, 0x74, 0x0, 0x3, 0xa4605, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff9, 0x4, @perf_config_ext={0x9, 0x3f}, 0x42800, 0x8, 0x6, 0x8, 0x3f, 0x1f, 0x400, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x3) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:36 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:36 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff, r0}, 0x78) poll(0x0, 0x0, 0x1ff) 05:11:36 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x0, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:37 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:37 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:40 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_ASYNC_CANCEL={0xe, 0x1}, 0x7) r1 = socket$rxrpc(0x21, 0x2, 0xa) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r1, 0x0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x10}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_READ_FIXED={0x4, 0x1, 0x2007, @fd=r0, 0x4, 0x1ff, 0x42, 0x0, 0x0, {0x1}}, 0x7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000240)={0x0, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000001880)={&(0x7f00000002c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast2}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)=""/21, 0x15}, {&(0x7f0000000600)=""/238, 0xee}, {&(0x7f0000000780)=""/245, 0xf5}, {&(0x7f0000000380)=""/93, 0x5d}], 0x4, &(0x7f0000000880)=""/4096, 0x1000}, 0x2042) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2000200, &(0x7f0000003bc0)="5b383e32679df51fac1616d61e4aecbee88f70bde7ee6d68dfd1c61818d87292121644d0a6e855087cedba8350f6709504bba9ac03e5e3f6c8f733209cd42f55685022d7034b74351952ba9ae1fc2965dd30299e26187cbb01b07af1139a0ecbbf1839d190cbfa09778ebbf56f9d79d4cdc38c4debf79194a26cc4238dc65ccb1df87240d7a9b17c3a3402be831e85b93ca8c1a7bf8f5b2ef4d7a4725222", &(0x7f00000001c0), &(0x7f0000000180), &(0x7f0000003a00)="ab83b3f8218f79dd30255fcfdd82d7612a1b70c45f6a6a8a6756dd030e83b6c6f6a8638918eb4e130d76b062a68498970e72683cec381895f9768c82fe53fef97cf488fa7b7bea1a85115f78e8b1900de0ee482ca11766560001d48249c7f6e3a26ecc34f51edee1fdf0e2918a046df2e4339d73cb79030ed64fb18bb8eb91ffbcc8e705a4e1e5d532998654c8cdf88f02a90ad941c24eeb9de7a65a43f866f51bf79145c178e7be35cc7659009e67d1f10b803e9911fbf8d4bc4e679a9cc573ad093b4751df52bab1403f96c7fd12fd25bc3e72276dca1585a059c112160fc956f4e6c01dd610462e03000000f4ff00"/252) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) ptrace$setopts(0x4206, 0x0, 0x4, 0x20) poll(0x0, 0x0, 0x1ff) read$FUSE(r2, &(0x7f00000018c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ptrace$setregs(0xf, r4, 0x8, &(0x7f0000003900)="974b2b0ae7011ff073c68fddb5f48a7fe8c527cc13f79992fcbfbd6d79c9410e3e9dcdd11eb9e1467905c6f0d825b473a422eb087369c84774b24e6a78789a76bdd694175caa8fc88258938ec376d85c51a93dd026a79022d93b564c2d7c341caba01d72afc7b56453ca94eaddfc093673b507ca1fd1c42285e413174ec840ca6bf9121ee3db0df5d77c42d744c1d482677ea0d93756c68835ca5192e3c6fc9af0e7db222d0caa080242db623551da6955c0ef2134dfc004826bfa504b3f533a880175044634a01fdab35de15d7853f6a99d13fccd1a90d31651b7b6ee9c4e29") 05:11:40 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) r0 = dup(0xffffffffffffffff) lseek(r0, 0x0, 0x3) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x9, 0xf2, 0x1, 0xe5, 0x0, 0x26, 0x80, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffa, 0x4, @perf_config_ext={0x200, 0x1ff}, 0x20, 0xcfe, 0x2, 0x4, 0x10001, 0x80000000, 0x100, 0x0, 0xe, 0x0, 0x10001}, 0x0, 0x9, r0, 0x0) poll(0x0, 0x0, 0x1ff) 05:11:40 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x0, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:40 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:11:40 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x826, 0x0, 0x4000}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:40 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d303030303030303030303030303030303030d7303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf60e7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cc9beb10aae14c06f9ec6f8213b414064000000000000009660b4383a00000000000000000f562ce166c782e65efe11e8cf33c134ff97f9300bd5e764b6276b1a8fe77fcbab99fcc0d8eccef51150b2de061000e0b3be5e091407511ae83091bd4774f6082a0eea3b642dddade89f60d9ae98f436617d70679335125b15b5e67a218fff030bc0416ea0a97575e901918b00b97ab0e1954ad0477171c10e52e26d8bff6dba2ff2d776aaeec3bbbcf900403e137ac75cd8ecced64a012e8d6d540353a84c64a55006af41de52674db86063b4cce7ba728caa039c601caebb351a124a1026927868932e05afb3473acc0dc03deb0c9c7cb76c28fa9b51"]) 05:11:41 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:41 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) writev(r1, &(0x7f0000000140), 0x0) write$binfmt_script(r0, &(0x7f0000000780)={'#! ', './file1', [{0x20, '\\'}, {0x20, 'vfat\x00'}, {0x20, 'vfat\x00'}, {0x20, 'vfat\x00'}, {0x20, 'vfat\x00'}, {0x20, '(-!{}'}], 0xa, "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"}, 0x102b) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[]) poll(0x0, 0x0, 0x1ff) 05:11:41 executing program 2: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000280)=0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x7f, 0x40, 0x0, 0x5, 0x8002, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x2, @perf_bp={&(0x7f00000001c0), 0x16}, 0x4d2e, 0x8, 0x3ff, 0x2, 0x8, 0x10001, 0xeac6, 0x0, 0x2}, r3, 0x10, r0, 0x3) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380), 0x4000000044882, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r5, 0x1, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r4, &(0x7f0000000000)="98", 0x1, 0x3f00}]) io_cancel(r5, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f0000000040)="6cb6703e20ba3fb703c83e38bcb6af8a0cec79e99497e58b82ecde85d93788d495f43d6449cfddb2c6574aeb760e95461d3bfdf47fe0f2fb43fdaa7a666aee383061d8e5203e1fa4e68a0f0ed7f5fbab274c1588845e37a7247d643863dd91adb68845a6e3b460034da885f2049b6ac8ab62e7f5a06d4b31adf7d6ab2eeb2531bcc258169e79e8d5896b6d45c3b27f32981f66d8212d385a4221b536e534293c64", 0xa1, 0x9, 0x0, 0x1, r1}, &(0x7f0000000180)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(0xffffffffffffffff) lseek(r6, 0x0, 0x3) r7 = dup(0xffffffffffffffff) write$eventfd(r7, 0x0, 0x0) io_submit(r5, 0x2, &(0x7f00000003c0)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x6, 0xfff, r4, &(0x7f00000002c0)="fc0da48f096c079d79c9", 0xa, 0x81, 0x0, 0x1, r6}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x5, 0x4, r2, &(0x7f0000000600)="8366f5986ce75d0eb9f0b11711e11fcbb2d279a3d89fced0c3359d376c20e125a842a5f0d686e0f32e0ca3f41fee18bc369a21565cf76f1bdea1c33019271a05ae91f6cf3a22b5ec2eda1c53bb1c9974f02d1c850ba2e48042b370048778ca77bc4f260c81336ed3804ed368f5af337547ae432702fa8ca93278cb35b5d032aba9824410d23b6355ffff248c27a2334a970cfc4fdaa49af60638ce6b2ef522715fdc76a96e66e55775", 0xa9, 0x3b, 0x0, 0x1, r7}]) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:42 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff, r0}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:42 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x0, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:43 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:48 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:48 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) mmap(&(0x7f0000152000/0x2000)=nil, 0x2000, 0x100000d, 0x80010, r1, 0xb2121000) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a00"/443]) r2 = syz_open_dev$admmidi(&(0x7f0000000040), 0x2, 0x40000) close(r2) poll(0x0, 0x0, 0x1ff) 05:11:48 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x0, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:48 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff, r0}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:48 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x0, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d303030303030303030303030303030303030d7303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf60e7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cc9beb10aae14c06f9ec6f8213b414064000000000000009660b4383a00000000000000000f562ce166c782e65efe11e8cf33c134ff97f9300bd5e764b6276b1a8fe77fcbab99fcc0d8eccef51150b2de061000e0b3be5e091407511ae83091bd4774f6082a0eea3b642dddade89f60d9ae98f436617d70679335125b15b5e67a218fff030bc0416ea0a97575e901918b00b97ab0e1954ad0477171c10e52e26d8bff6dba2ff2d776aaeec3bbbcf900403e137ac75cd8ecced64a012e8d6d540353a84c64a55006af41de52674db86063b4cce7ba728caa039c601caebb351a124a1026927868932e05afb3473acc0dc03deb0c9c7cb76c28fa9b51"]) 05:11:48 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x7, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000010001008b3757504d53342048000104e5ff0085100000ffffff84c710bf58099a532522d641ff381b180000000400200c00000100010095000004000000000000008b00000800001b509db9fda33ee422c75597aac59c5a3276fada20c28b700242310b3d"], &(0x7f0000000140)='GPL\x00', 0x0, 0x94, &(0x7f0000000180)=""/148, 0x40f00, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x3, 0x8, 0x80000000}, 0x10}, 0x78) close(r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:48 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x0, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:48 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:49 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x0, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:49 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) r0 = dup(0xffffffffffffffff) lseek(r0, 0x0, 0x3) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000040)={0x8, 0x1, 0x8, 0x401, 0x3, "e1a00cfb773445c3825f6f577570c54931b0fa"}) poll(0x0, 0x0, 0x1ff) 05:11:50 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff, r0}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:50 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000780)=""/4096, 0x1000}], 0x1, 0x7fff, 0x3639) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x8000000, &(0x7f0000000140)="f62bf1febe9c139079e6560a381e5534f16147c17be8dcaabed2655fc5f76525fd74fc69c01da52da17115a30c99bc2fee87e248508b72186c63b245fbaf8c8d6d8d64c68412e41a197d3a86280ed56b9c2a41df7b3e908a0b6cd81bd7bade8f6ca9324060bf769dd0d4fdd5d56ad6e5a30f317c2801d98ddd21232db933ad1d91ae382996dcd289a1ffebfad577bb8045aa8f17cfb613235bd4c294d8cf1ee9a038ae92d867fc52b5fdf28e094fba1b927b8c5b723742de1d48fb581e5b89e252c12c0defc32a3e23b2519e2d91622618769d6968ed788f829514b307d8f4694eba2731c5", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)="e673f6acf8d9735310613d450bf13686796bd3559eadb8b50a96c478902900b114255d2f073b80bcf42d643ceaf456a089ec13621333d695b723d588eebdbdbae5625f93382d85f33f79ac1af22728472b8792e4d7068246cfb7aa9861761225d6b9b8465f1918c90b8092ffa617a5dc30dd195731fe11355b1a23") syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x8000000000000000, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:50 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:52 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x0, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:52 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1000, 0x20080) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x10000100, &(0x7f0000000140)="7da18aba8d681c882603ce0f8d2cc0987ab7d134b2861676b7812df8a0a448bf4a967ab529763030c269572de3c1a73116bec161347913e2b926a1cc8ce3e522aba4a4feaf42afae3b9bbc0fa665c7908419b0b067eb99d6be397a722db4fbb6b41c5d665d61ba4955482267f6eb3687d93d4fbc1b7939616d1c243233bbfe6ac9c4799fc1994a749fa0db39b3e409c19167cfc41227964c03d208c01f87b02ef5c5095195e9cc", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="ee6ef588b9d7196d4e02ed6e529d5d4664366f73b8907cbd2954b15e6cb721a29f37d079490d50aff27bda2110dce789fd85a08c2e9d48c13957bf58d70700fa062ef81dc86a18427b9a7aaf3a9dedce4280b8576bd1efd7a8f6225cb3eb3ead7caa005fac5360f5e7b2ca6033bd034b569c9ace3d5c8e542ce2e5adebb7ce1d76b73feea1bef9072f820a40acdcbfdd0f6e48b271d917ea80205bb224846db18a1cc4013a086cd0692712c1ddcef6d5465a7e222ac142978711c7c9") syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) syncfs(0xffffffffffffffff) 05:11:52 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff, r0}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:11:53 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:53 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x0, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:53 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x1}, 0x50410, 0x1, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8}, 0x0, 0xa, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="30303030303030303e3030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaf25da3bee5c09603ac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a5f152b24c89a4ae5e79c8229d85db290c9a410f3156bdd19b78c1102dc285a14f949a34364dc8bcbfcf233d3bed54c01ae3fd4a0a8c32af68b78c35a6e9073ca2590b6011139c0abd08f3daf"]) poll(0x0, 0x0, 0x1ff) 05:11:53 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:54 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff, r0}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:54 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) r0 = dup(0xffffffffffffffff) lseek(r0, 0x0, 0x3) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000040)={0x8, 0x1, 0x8, 0x401, 0x3, "e1a00cfb773445c3825f6f577570c54931b0fa"}) poll(0x0, 0x0, 0x1ff) 05:11:55 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x200080, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000003c0), 0x42000, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x40, 0x5, 0x68, 0x5, 0x0, 0x9, 0x400c, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x400, 0x1ff, 0x3, 0x5, 0x2, 0x1, 0x1000, 0x0, 0x1000, 0x0, 0x9}, r1, 0x0, r2, 0x8) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:58 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:11:58 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:58 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:11:58 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000829bd7000000000000100000008000400e000000214000600626f6e64300000000000000000000000080005000000000014000600726f73653000"/70], 0x4c}}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) open(0x0, 0x0, 0x0) ftruncate(r1, 0x208200) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) 05:11:58 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[]) poll(0x0, 0x0, 0x1ff) 05:11:58 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x505a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0xfffffffffffffffe, 0x0, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) clock_gettime(0x0, &(0x7f0000002ac0)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000002a40)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000140)=""/59, 0x3b}, {&(0x7f0000000180)=""/97, 0x61}], 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000200000000000000001000000011d0000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xe8}}, {{&(0x7f0000000340)=@abs, 0x6e, &(0x7f0000002900)=[{&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/17, 0x11}, {&(0x7f0000000600)=""/247, 0xf7}, {&(0x7f0000002780)=""/68, 0x44}, {&(0x7f0000000400)=""/36, 0x24}, {&(0x7f0000002800)=""/244, 0xf4}], 0x6, &(0x7f0000002980)=[@rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb0}}], 0x2, 0x2102, &(0x7f0000002b00)={r1, r2+10000000}) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1, 0xba, 0x9, 0x80, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000040), 0x8}, 0x108, 0xb4d6, 0xb43, 0x1, 0x40, 0x5, 0xfff9, 0x0, 0x1}, r3, 0xf, r0, 0xb) clone(0x3539ab81dd3b117d, &(0x7f0000002b40)="d4e3bca9188654062e1a18a0b084a0d80143dc43a03bab9fef59585d6113508834bff6ec42408c5c2ff67447a54581bec65f0c9f4426ba6439fe119f30e6edf1e4e1af90737d6f7c236571bcc59be322c33e89077b13f64fa8a2627c8eb118516ce299946baa978b21412c02fe208335", &(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)="f9261fd1b3bf9fa15bd6e43c64647a64599ad6e6b949eb9567146f446fbe48aca5154e8e04bdd25f93e695200996f416bf17b5687f1c22a648900826801217b9b7af3f7609bc945ef0b67d6a8af3f3d0ad8c3b8f6c85529fa488b5e3cc042df1f591ea5d9d056fcd3ab43cbac514a4a29d96f0d86870a73027d516f7c30647bcfac3013c0a1c28a007b18275a2399217d344e7a08c0f7821952a341dc2e025dc79bdfe87d22442942db7d10f3b4d951e4fd0ccc8b8816ccfc6fb0e0d7d16863a6cb1d6504063523e4c1ea7143769a21c9313dde5") 05:11:59 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:11:59 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:11:59 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) mmap(&(0x7f000056d000/0x1000)=nil, 0x1000, 0x2000001, 0x40010, r1, 0x50e79000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145103000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) open(&(0x7f0000000080)='./file1\x00', 0x10580, 0x10) poll(0x0, 0x0, 0x1ff) 05:11:59 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) lstat(&(0x7f00000000c0)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$kcm(r0, &(0x7f0000001b80)={&(0x7f0000000600)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e24, 0x2}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000000680)="5f17ee0621abad010f32277fa24dcb95fa9c571f2bef5dfbddf77932027ccfa50f1fcbad3299ef0935bdf3fc", 0x2c}, {&(0x7f0000001940)="f4bb44cb0496e657dc009822618742359f12fadd0d17603ebe0362f7c4ccc6d54d48a5a2b965dd4b6d6373d55df27997d3fec676d71f2d8712b12e31e2a4a427d81e4d3ae30c4bb191dedf2732c9d869f506827d9417115d46cf3bebffbc15e4e8995b1caf5c443cf6cc7c9a8ab3875616e622bb9a7b388a4c8bbe9838ec2e2c2c61bf10e2307a2fa2c7636c9fb7ea19b696daee06e0a455318c00d2dcc9df9db14929fc1f009e7334b217e11f1e940350950df4fbee7628f4c11058999548d1e86792e1810aee8212a3fafc5ab1ecc4be14", 0xd2}, {&(0x7f00000006c0)="b9464364286601c3f7640616dd0f81487fd2c800b5af84", 0x17}, {&(0x7f0000001a40)="6a0ca18b428166746b136fc8c4804d68696e9119759230a66a1306500b324212b03bf74bdc3b183000fa8d73a78d5ed365bcdbdf6f46e1f3e6550aa2bda39beff3593faf76f05e8b75414f838e0e901057791d16ab6e3befae55bafd880419cdc16b4249b79c5fd65df62e4a166772e5921b85021407f3b291eed3318f92043c696809ffc4b04757c4bc80a1479d050417ed23f565ba91b09d3e9d23d1cd19c192a7e29455dd12194a97e630224ebf6d36f39f40b2c4cde8c4334cb6bf19536191f8cc648914de6784b62e2b8c53f2370ff019ac7187b9c684b812b713945f9c40575518f17f526191c6aef9", 0xec}], 0x4}, 0x20000881) syz_mount_image$udf(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x4, 0x3, &(0x7f0000000340)=[{&(0x7f0000000140)="e2adbbfd2821043344ce24aa4e28f35597232a82dc1a1527312fbde3ee6d7e006fe06f0f00083dc32b930f734a7ba9b35dd6c9c3069f708f915b2acfe4cb6b2b884bf3e6993da34ea16134a4c08ccf367597c553804126d14fc809074ebb9a2f7cbc657eb169e07aef86d30dccb8c6df81b8c68d2f90b3327ad45ddcabc36cd1bbcbfdfcda09dccad50893adfd13948bad3802fda23183786a2b0aa75b0fe55e44d0bd448f4567eeba5aacb99827bc3a66ffaf8a313c959ddecfaff86c3acf8530681e", 0xc3, 0x4}, {&(0x7f0000000240)="2471750d31ed190be77f3e49c6633a255f7716b769587280121ce4d4ecb2a26e565e3701e0756a7ea330a733a23255c4e8eed48918e6f4e2aab4368c25dbcf65119b69a3f6677ca213ce2945763e6fa361c31081088cfe14c220c8dd302bf0c65515b0b0d30bbf1964b781ad16554d9555ffd7e6b5d8509fe9dd8cc4bf10d1a70e9a258c4c6568e155b2b53822bc30495b03704565830bef7b36c32f4ace1a0d1f9d1de54910a029e493a76401b6414165e09c3eb834652f8dcdcea63c1ef8bc5a546996b03a05076101b180", 0xcc, 0x4}, {&(0x7f0000000780)="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", 0x1000, 0x4}], 0x3002, &(0x7f0000001bc0)=ANY=[@ANYBLOB="706172746974690f5cd14d30303030303030303030303030303030b89dbce0736573556940003d3030303030303030303030303030303030357365737369f216be18e5cad8e02130303030303030303036303734332c756e64656c6574652c726f6f74b13abb6469723d313834343637342430373337303935353136060000006d61736b3d30303030303030303030303030303030303030303030372c757466382c75c5d3cae690f18ef5f58832215ff16684eef697cfa2dfbc875339c9b5908b60b56698e9c3dd072bf9e312aef96d", @ANYRESDEC=r1, @ANYBLOB=',shortad,rootdir=00000000000000000003,uid>', @ANYRESDEC=0xee01, @ANYBLOB=',uid=', @ANYRESDEC, @ANYBLOB=',smackfsroot=[%#,,dont_measure,smackfsroot=vfat\x00,dont_measure,fsname=vfat\x00,appraise,permit_directio,fscontext=user_u,\x00']) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:11:59 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000100), 0x4) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3a) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) statx(r1, &(0x7f0000000300)='./file1\x00', 0x3100, 0x20, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f00000001c0)="25eadca52290d2c61d1fd22124ce6f125752e0ee9290bf2c40492fa9a0494f8ce33468de9c149e5d9ca50843e4b9d3d6c42f77e3b4ff4f92352279501bfdf3c94818cdf728b3e8646341324078d40892a7968e013eb054", 0x57}, {&(0x7f0000000240)="e345a436ff5a6ba751d63ed697a7ed519102b751414c39748e67a8b0488197b0e3de3e4f1c5f856e6b4b7ddc9f9e325552004af25508adbfc3a54308a077fd8aab4aa77aaa269ae2ef7dfcc2f33e14108f0e4fc3b8d61d54ed659a", 0x5b}], 0x2, &(0x7f0000000780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r1, 0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}], 0x90, 0x4080}, 0x4000044) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:00 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x482, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000080)={'security\x00', 0x1, "df"}, &(0x7f00000000c0)=0x25) poll(0x0, 0x0, 0x1ff) 05:12:01 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d303030303030303030303030303030303030d7303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf60e7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cc9beb10aae14c06f9ec6f8213b414064000000000000009660b4383a00000000000000000f562ce166c782e65efe11e8cf33c134ff97f9300bd5e764b6276b1a8fe77fcbab99fcc0d8eccef51150b2de061000e0b3be5e091407511ae83091bd4774f6082a0eea3b642dddade89f60d9ae98f436617d70679335125b15b5e67a218fff030bc0416ea0a97575e901918b00b97ab0e1954ad0477171c10e52e26d8bff6dba2ff2d776aaeec3bbbcf900403e137ac75cd8ecced64a012e8d6d540353a84c64a55006af41de52674db86063b4cce7ba728caa039c601caebb351a124a1026927868932e05afb3473acc0dc03deb0c9c7cb76c28fa9b51"]) 05:12:01 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:12:01 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:12:02 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) fcntl$setstatus(r1, 0x4, 0x40000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:02 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:02 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:03 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYRESOCT=r0]) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000040)={{r2}, 0x4, 0x9, 0x1ff}) poll(0x0, 0x0, 0x1ff) 05:12:03 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) r1 = syz_open_dev$amidi(&(0x7f0000000040), 0x7, 0x200000) splice(r1, &(0x7f0000000140)=0x7fff, r0, &(0x7f0000000180)=0x1, 0x6, 0x0) 05:12:04 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYRESOCT=r0]) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000040)={{r2}, 0x4, 0x9, 0x1ff}) poll(0x0, 0x0, 0x1ff) 05:12:04 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x4, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @bcast, @null]}) poll(0x0, 0x0, 0x1ff) 05:12:04 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:04 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0xff, 0x89, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x1, 0x68, 0x10, 0x1f, 0x0, 0x1ff, 0x12000, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0xfffffffffffffffa, 0x200}, 0x48011, 0xc2c7, 0x2, 0x3, 0x200, 0xffff, 0x6, 0x0, 0xb56, 0x0, 0x7ff}, 0x0, 0x3, 0xffffffffffffffff, 0x9) vmsplice(r0, &(0x7f00000002c0)=[{&(0x7f0000000140)="a6e8f9a18d0825cf4a4f9ec1eb192b7b372351718a4bfeea2564f92b49d08b2ddd886fe2ad0777b24b7b9e81e6ced87bcea738bb935a50f598252e67d4a468895ee054d32380f54ec7520a51f2e644c7114c1547445de82a0cee6f2f640cd7b1a8a32920becf71a68e7a7df685e8c4d054278bd8dd12eb109902961567460ebc062c72370ed2961674e2624890764434145dd5a4b10b4c220b34fab67a30a1beacec120cd6c6da17a1c00ae6a23ef94cf5f3672f0f2202ba16f38a2534e60d60dc34da916560fbee67c27c387448872eed01fc2a222169ce02aaa6bcac28e522067c68844c27ce78477428aa3c5654ed666e", 0xf2}, {&(0x7f0000000040)="97e729326452ec22d472", 0xa}, {&(0x7f0000000240)="046119a705f6f073f7790db66adea923ba56cfb4f2f822c98ff14bf73d20699132caae1b14d8e988a60b8ab76bb93e", 0x2f}, {&(0x7f0000000280)="ab74288bb4d782509d162a6861ad9e88e60ea6302a451bd32fb5e8163b095b52ec35df01dc933f857ba4ad793863018a7697ba5d639a62f1e449b4", 0x3b}], 0x4, 0x4) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:06 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x38, '\x00', 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d303030303030303030303030303030303030d7303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf60e7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cc9beb10aae14c06f9ec6f8213b414064000000000000009660b4383a00000000000000000f562ce166c782e65efe11e8cf33c134ff97f9300bd5e764b6276b1a8fe77fcbab99fcc0d8eccef51150b2de061000e0b3be5e091407511ae83091bd4774f6082a0eea3b642dddade89f60d9ae98f436617d70679335125b15b5e67a218fff030bc0416ea0a97575e901918b00b97ab0e1954ad0477171c10e52e26d8bff6dba2ff2d776aaeec3bbbcf900403e137ac75cd8ecced64a012e8d6d540353a84c64a55006af41de52674db86063b4cce7ba728caa039c601caebb351a124a1026927868932e05afb3473acc0dc03deb0c9c7cb76c28fa9b51"]) 05:12:06 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:06 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000000c0), 0x85b, 0x410000) close(r1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x18080, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r2, 0xca289435, &(0x7f0000000780)={0x1, 0x9c, @status={[0x1000, 0x100000001, 0x2, 0x2, 0x7f, 0x5]}, [0x4, 0x5, 0xffffffff, 0x91, 0x8, 0x0, 0x9b, 0xffffffff80000000, 0x4, 0x1, 0x200, 0xb1ac, 0x7, 0x9, 0xffffffffffffffff, 0x80000000, 0x1, 0x2, 0xdc, 0x5, 0x8bf6, 0x1000, 0x0, 0x2, 0x4, 0x100, 0x100000000, 0x3f, 0x8, 0x100000000, 0xffffffff, 0x100, 0x3, 0x8, 0x3, 0x9, 0x7, 0x1, 0x8, 0x7, 0x1, 0x6, 0x200, 0x800, 0x3, 0x9, 0x2, 0x9, 0x0, 0x5, 0x6, 0x1, 0x81, 0x8, 0xa8ff, 0x10001, 0x8, 0xfffffffffffffffb, 0x1, 0x9, 0x4820000, 0x200, 0x9, 0x1ff]}) sendfile(r2, r2, &(0x7f0000000080)=0x4, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:06 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="66643d446f19caeb577281d07c9573eeba17abf9a030dc445eb28e8ad65e0d4527341e93a1889ac98f72a6a1b0ffc20373601b909b293059dd2695953997beeeda4cd762fe2de318967aa8e429a9c35d1d3e7f22a870cd19e811fd447461437e507e0bb506e502c728151494eb8522df57a4d4b27ed219a93f352e777d8c632326f5", @ANYRESHEX=r1, @ANYBLOB=',n']) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x4010, r0, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x4, 0x96, 0x4a, 0x0, 0x5, 0x80a8, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf1, 0x4, @perf_config_ext={0x0, 0x7}, 0x180d0, 0x2, 0x5, 0x2, 0xb039, 0x100, 0x7, 0x0, 0x7fffffff, 0x0, 0x1}, r0, 0xd, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:06 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) dup(0xffffffffffffffff) r1 = socket$pppl2tp(0x18, 0x1, 0x1) lseek(r1, 0x2, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000140), 0x1, 0x40000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000180)=0x19) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x6a8082, 0x0) 05:12:07 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:07 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000000c0), 0x85b, 0x410000) close(r1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x18080, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r2, 0xca289435, &(0x7f0000000780)={0x1, 0x9c, @status={[0x1000, 0x100000001, 0x2, 0x2, 0x7f, 0x5]}, [0x4, 0x5, 0xffffffff, 0x91, 0x8, 0x0, 0x9b, 0xffffffff80000000, 0x4, 0x1, 0x200, 0xb1ac, 0x7, 0x9, 0xffffffffffffffff, 0x80000000, 0x1, 0x2, 0xdc, 0x5, 0x8bf6, 0x1000, 0x0, 0x2, 0x4, 0x100, 0x100000000, 0x3f, 0x8, 0x100000000, 0xffffffff, 0x100, 0x3, 0x8, 0x3, 0x9, 0x7, 0x1, 0x8, 0x7, 0x1, 0x6, 0x200, 0x800, 0x3, 0x9, 0x2, 0x9, 0x0, 0x5, 0x6, 0x1, 0x81, 0x8, 0xa8ff, 0x10001, 0x8, 0xfffffffffffffffb, 0x1, 0x9, 0x4820000, 0x200, 0x9, 0x1ff]}) sendfile(r2, r2, &(0x7f0000000080)=0x4, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 793.696542][T18638] fuse: Bad value for 'fd' 05:12:08 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x0, '\x00', 0x1, 0x0}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d303030303030303030303030303030303030d7303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf60e7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cc9beb10aae14c06f9ec6f8213b414064000000000000009660b4383a00000000000000000f562ce166c782e65efe11e8cf33c134ff97f9300bd5e764b6276b1a8fe77fcbab99fcc0d8eccef51150b2de061000e0b3be5e091407511ae83091bd4774f6082a0eea3b642dddade89f60d9ae98f436617d70679335125b15b5e67a218fff030bc0416ea0a97575e901918b00b97ab0e1954ad0477171c10e52e26d8bff6dba2ff2d776aaeec3bbbcf900403e137ac75cd8ecced64a012e8d6d540353a84c64a55006af41de52674db86063b4cce7ba728caa039c601caebb351a124a1026927868932e05afb3473acc0dc03deb0c9c7cb76c28fa9b51"]) 05:12:08 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) [ 794.403908][T18640] fuse: Bad value for 'fd' 05:12:08 executing program 2: r0 = perf_event_open(&(0x7f00000008c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) sendmsg$IEEE802154_LIST_PHY(0xffffffffffffffff, 0x0, 0x80) r1 = syz_open_dev$vcsu(&(0x7f0000000040), 0x1ff, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f00000004c0)=@req={0x20003, 0x2008cd, 0x98b1, 0x7}, 0x10) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) getpriority(0x2, 0xffffffffffffffff) fcntl$setownex(r0, 0xf, &(0x7f0000000500)={0x1}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYRES16], 0x14}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000380)=0x14) sendmsg$AUDIT_TTY_SET(r5, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x18, 0x3f9, 0x800, 0x70bd27, 0x25dfdbfe, {0x1}, ["", "", "", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x24000844}, 0x4040000) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000000700)=ANY=[@ANYRESDEC, @ANYRES16, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=0x0, @ANYBLOB="ea00011f000000000000000000000100000000ad6506f6336ade51fc6b1d89c84651f4d23cd758de80f116a55b83c8a6e3045ab146071f3b89263014920eafaba4f55b21e92262c3b1b3f9c7097f517b680e5290394d272a2d9b0c7d6a22fb2efeb5bda931785acc1588884bb4fe1ceb4b0f1fe8396d864501f0955330a30233e0011188eb875f9dd54faea0d273b2", @ANYRES32=r3, @ANYRES16=r2, @ANYRES32=r6, @ANYBLOB="49be15ba9ec9a4e9c2148cc087ef025e667626c26ef530dd460b2564579b2ed2b5c83b5faa322662efe73c759826a830cd56f474f6b843abeead0a01daaa9ae44b6f"], 0x6c}, 0x1, 0x0, 0x0, 0x24040054}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@dev={0xfe, 0x80, '\x00', 0xa}, 0x40003a, r3}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newlink={0x60, 0x10, 0x8, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x1163}, @IFLA_ADDRESS={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2f}}]}, 0x60}}, 0x0) 05:12:09 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x200200, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x50410, 0x3, 0x9, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./file1\x00', 0x72) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46a08000000000000006fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b54f9e6b95ca6720cc76ca640e5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000140)="507d8985c180530e24f3a95a4c", 0xd}, {&(0x7f0000000180)="ab1bccdbe631234631698e8fd1a7062798fab342ce13f7e87a79a74be2df1acfef57b2089f8d4242089e28b654761e28e14d30a11e48f922ca42868b0c1e3896e9243d86e973cb2d2d14b2e52534bbc121b2553d352b79ba2c7900abb82ff83cf15db4491fbea24eb8682b6de8fac015ace038440848a1f4a7ed9cd4092ae5eaea6cc623442251e94e8fa228561b84d368db51398dbfcca39e4c24d8d204c5b5d32a9a726f660097d2eb67a02e2dac566f8f7b558c768139", 0xb8}, {&(0x7f0000000240)="0b14ca2dcf74d439fef18e21e7a0f2a8b332a274876968b0bbf0f2bcae906eed0b7ed2b0539f1108a29fbe281ca24935317c59ef449308d6b6bd7c9a6b73d0b65b659283d305f09dd6b512948e0d079b75417cad75d2f871cc369d7ae128664ea8b923ffcb19f9284365c349b39c4879cddb59cc6ddb035fa52506325c14dc777436c268bab7a39086f527db873fc37ae3f53a25fc20b2db95a63cbb8289c9c00b98f41318b14ca39037099c5bc3e5a7767f9e5ce93b46d8c373da943c", 0xbd}, {&(0x7f0000000300)="92990793c3eb0dfb82eb785959ff96adb0e5ac339e884f787264fb8111178dcb8978afd4cfd742e153fdd12e", 0x2c}], 0x4) poll(0x0, 0x0, 0x1ff) 05:12:09 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:12:10 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x0, '\x00', 0x1, 0x0}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:12:10 executing program 2: setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000040)={0x2, 0x86}, 0x2) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51d1, 0x1000b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) write$eventfd(r1, 0x0, 0x0) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f0000000000)) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000240)=ANY=[@ANYBLOB="16000057e0f74c21246900"]) pipe(0x0) 05:12:10 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x0, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:10 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0xf9, 0xdb, 0x0, 0x9, 0x0, 0x7f, 0x3c81c, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000, 0x4, @perf_bp={&(0x7f00000001c0), 0x2}, 0x1d128, 0x7ff, 0xf656, 0x8, 0x3, 0x10001, 0x2383, 0x0, 0x8001, 0x0, 0x3}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145114000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc05f70f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b438"]) clone(0x1000000, &(0x7f0000000040)="664887c64366d0af41c3ba616ceb4640e0ed87c2445efffce4357f85c8f2", &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)="e2d70998b01d84fad0b82741969dcaf2dc2fe32852064835ff7be9f64cc6e4f3d117ed8dc2c6c983ecec185992b39e1cac13658e72a32ff116d56a308955996c4b40ed4e7850b61d9ddb29818009b73075101baf7e00e59b249c862204001e431dc3c6d661e52f29ae26ca72f1bd3370f5822d80887f778b5b2041b87b5908d9dbb8de0b0370c0b7bf999f843114ef89b10f59053556b253db2e13730e017df3e8e09f15a3648e9431783d25c319d1c9f50c93d0f356a7bff316b007cdd5a8d518de649bd74306165f5e429da2c6c989") poll(0x0, 0x0, 0x1ff) 05:12:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:12 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x0, '\x00', 0x1, 0x0}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:12:12 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x0, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000040)=[{r2, 0x8610}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmsg$unix(r1, &(0x7f0000006200)={0x0, 0x0, 0x0}, 0x0) tkill(0x0, 0x3a) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3a) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000080)={{0x1, 0xee01, 0x0, 0x0, 0xffffffffffffffff, 0x199, 0x4}, 0x0, 0x0, 0x4, 0xa33, 0x100000000, 0x7f, 0x2, 0x8, 0xa717, 0x1, 0x0, r3}) 05:12:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000040)=@raw=[@generic={0x3, 0x9, 0x4, 0x4, 0x4}, @call={0x85, 0x0, 0x0, 0xa9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:14 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xe02, 0x130) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) open(&(0x7f0000000300)='./file1\x00', 0x40900, 0x0) poll(0x0, 0x0, 0x1ff) chdir(&(0x7f0000000040)='./file1\x00') 05:12:14 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x0, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:15 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:12:15 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:12:15 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x35}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbd1f00000014c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) socket$inet6(0xa, 0x9, 0x953) 05:12:16 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) lseek(r0, 0x0, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x40, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@getneigh={0x14, 0x1e, 0x200, 0x70bd2a, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3a) ptrace$cont(0x1f, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x8a, 0x1, 0x2, 0x5, 0x0, 0x9, 0x8000, 0xa, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x8, 0x1bc}, 0x10000, 0x0, 0x18, 0xc, 0x4, 0x7fffffff, 0x9c00, 0x0, 0xffff, 0x0, 0x6}, r1, 0xe, 0xffffffffffffffff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/485]) poll(0x0, 0x0, 0x1ff) 05:12:17 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:12:17 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:17 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 808.203840][ T1194] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.210168][ T1194] ieee802154 phy1 wpan1: encryption failed: -22 05:12:27 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46002) creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) pipe(&(0x7f0000000000)) fallocate(r2, 0x0, 0x0, 0x1000f4) sendmmsg$unix(0xffffffffffffffff, &(0x7f000000f000)=[{{0x0, 0x0, &(0x7f00000033c0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14", @ANYRES32, @ANYBLOB="03d1cc75e33c52ed2c0dabbcb325c01ec5c9866c2bba055af825fa412e582ad097759e182ce8716feb3ea4961b81366408b8f73732650b79957be60f5aa4195bc6cb54d4b2706aa3bc236161977322178360a96d3cf9c736f00cda0d68161ec988fd6c895088187701b68141d666e1ecb147734bbf8e261d25d9c73166a0469796062d353aed871ecde90c69", @ANYRES32=0x0], 0x38}}, {{&(0x7f000000c300)=@file={0x0, './file0\x00'}, 0x6e, 0x0}}], 0x3, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) dup2(r3, r4) r5 = dup(0xffffffffffffffff) lseek(r5, 0x0, 0x3) ioctl$VT_WAITACTIVE(r5, 0x5607) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x101010, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) bind(0xffffffffffffffff, 0x0, 0x0) 05:12:27 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:12:27 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) mmap(&(0x7f0000718000/0x4000)=nil, 0x4000, 0x1, 0x10010, r0, 0x7284000) poll(0x0, 0x0, 0x1ff) 05:12:27 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:27 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 814.554432][ T26] audit: type=1800 audit(1634188348.289:10): pid=18811 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=14162 res=0 errno=0 05:12:28 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x2d, 0x1f, 0x20, 0x40, 0x0, 0xd2, 0x208, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x3}, 0x0, 0x4, 0x7ff, 0x9, 0x9, 0x800, 0x100, 0x0, 0xc8, 0x0, 0x1000}, r0, 0x1, r0, 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, r1, 0x1) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x2fd000) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x2285, &(0x7f00000020c0)={0x0, 0x800000000}) r2 = socket$netlink(0x10, 0x3, 0x10) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000080)="480000001500197f09004b0101048c590188ffffcf5d3474ff9212e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee22600d4ff5bffff9b226452", 0x48}], 0x1) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000880)={@ipv4={'\x00', '\xff\xff', @empty}, 0x35}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6d34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65a82948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e021f8ea76f74a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b4140640000000000000096"]) poll(0x0, 0x0, 0x1ff) 05:12:28 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x48, &(0x7f0000000180)=""/72, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:29 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) [ 815.697589][ T26] audit: type=1800 audit(1634188349.429:11): pid=18820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=14162 res=0 errno=0 05:12:29 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:12:29 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 816.322247][ T26] audit: type=1800 audit(1634188349.529:12): pid=18826 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=14162 res=0 errno=0 05:12:30 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:12:30 executing program 2: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="10000000000001000100050000000000ffffff7f200000005a4d", 0x1a, 0x400}, {0x0, 0x0, 0x800}], 0x8002, &(0x7f0000000040)=ANY=[]) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x5}}]}}]}, 0x48}}, 0x0) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x5}}]}}]}, 0x48}}, 0x0) r9 = socket(0x10, 0x3, 0x0) r10 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r11, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x5}}]}}]}, 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=@ipv6_delroute={0x19c, 0x19, 0x200, 0x4, 0x25dfdbfe, {0xa, 0x80, 0x80, 0x0, 0xfc, 0x4, 0xc8, 0x9, 0x500}, [@RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @SEG6_LOCAL_NH6={0x14, 0x5, @local}}, @RTA_EXPIRES={0x8, 0x17, 0x8}, @RTA_METRICS={0xd7, 0x8, 0x0, 0x1, "c558b484992ae01cacb22a94bc2ee0e4eed6edec7c6504dd252b557b85dd4c9c2ded5cd686d046f65ab9b31c430fc5dcfd5e867afc95021d261e35a159d51ef25fda7e6898db964eb5497e13126245f02d2e11336a148b2042600c738aca977e11a28fcf61dc73ae526b673e7cf823c45e46bd747e635bccb66af06d616bd0be1a3c5d651c88a8c375a5df1ebfd29f0363352a65f825c007b50ea799a561fe0703086ee8dccc9ff152bbfcb06b05d96c31bd39cf4e06b1340bb4250df444ede9bfe41224b57a7ac752d10ab2f93f16675b15d7"}, @RTA_OIF={0x8, 0x4, r4}, @RTA_UID={0x8, 0x19, r5}, @RTA_METRICS={0x5e, 0x8, 0x0, 0x1, "9f03e651b949b2db042f6441f23123e01b33f723c83438881420f35babd836374f78802738507a9be1cde1020d76c41c834a3cc08e101c869a794fd41790ad498f05a0fc1c7bfef24a8535a3e2fee8043cbddf8d76fb613d385d"}, @RTA_IIF={0x8}, @RTA_IIF={0x8, 0x3, r8}, @RTA_IIF={0x8, 0x3, r11}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4040041}, 0x8800) syz_mount_image$ufs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x5440, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000140)="c1b3b058f9b900f07cdbf1c6b12b92a363be44ab87ec26fdec79b7bd56538df3b2b5345b0eb445eb538148919b96baaa8671931b6f39d1e983caf06687483240adb8b84755f72a75f530f7f4b7d8387993d871624e92a069e6c4679c89ad29ce3da6ab0a5e67480f603051198c22a414e28fe54d72e42978f1e0742f2139f3555410b6b770a339cdc60c3430f3072a55c0fda6c3fdd85d045713289537c14eaff6d3602d8c347c7c22e5cb925c2a7433e3cae140", 0xb4, 0x9}, {&(0x7f00000002c0)="d42db8b47a28f04616489a5f64a34ce3214e6af00166d4a44634810be6356442b8adbcc4aa898a7fc6c76c01fb086f99049c81c553b72ecf1050e5c1980b795a509fd637bda52f3638bc75ac58c5f07aa55067aaaf65a10145acd271d621588aa18744c39541e7795ffa51359371f0afbeb579696857a73a306419a01ac01be3a3929d2e9129c1bcfa50e4627b6fe088f064087c91b0ff88394130c5db99713f1401c0cff13e109d191567d3f75fa40bdb6841345a71021140982766ec161dbfdf5b48caccb973a2d7a984e35a7b", 0xce, 0x5}, {&(0x7f00000000c0)="dfbca791818c220c80fb74136a", 0xd, 0x200}], 0x810c00, &(0x7f0000000440)={[{'minix\x00'}, {'minix\x00'}], [{@obj_role={'obj_role', 0x3d, 'minix\x00'}}, {@subj_role}, {@subj_user}, {@fsname={'fsname', 0x3d, '\x90,*&:\\'}}, {@uid_eq={'uid', 0x3d, r5}}, {@smackfshat={'smackfshat', 0x3d, '@\\/.[/&['}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xe3,'}}]}) connect$pppoe(r9, &(0x7f0000000240)={0x18, 0x0, {0x4, @empty, 'bridge0\x00'}}, 0x1e) 05:12:31 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x800800, &(0x7f00000001c0)=ANY=[@ANYBLOB='zd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',blksize=0x0000000000000a00,blksize=0x0000000000001c00,allow_other,appraise,mask=MAY_APPEND,mask=MAY_APPEND,\x00']) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:31 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) [ 817.423475][T18849] loop2: detected capacity change from 0 to 8 [ 817.702586][T18854] loop2: detected capacity change from 0 to 42 [ 817.964710][T18854] ufs: ufs was compiled with read-only support, can't be mounted as read-write [ 818.314066][T18849] loop2: detected capacity change from 0 to 8 05:12:32 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, 0x0, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:32 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000140)={'wg1\x00'}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) chdir(&(0x7f0000000040)='./file1\x00') [ 818.652861][T18849] Unable to read inode block 05:12:32 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="13000000010000000b00"/20], 0x412f02) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180)={0x0, r0}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541b, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = dup(0xffffffffffffffff) write$eventfd(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xd, 0x9, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x1f}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit, @exit, @ldst={0xfb730140d577fef0, 0x0, 0x3, 0x0, 0x3, 0xfffffffffffffff8, 0xf8bcfc97d4fae714}, @ldst={0x3, 0x1, 0x2, 0x2, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000140)='syzkaller\x00', 0x4, 0xc2, &(0x7f00000002c0)=""/194, 0x41100, 0x19, '\x00', 0x0, 0x6, r0, 0x8, &(0x7f0000000240)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0xb, 0x81, 0x40}, 0x10, 0x0, r1}, 0x78) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x33) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x1, 0x3e65957f}, 0x0) 05:12:33 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2001, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={0x0, 0x1}, 0x50c10, 0x3, 0x9, 0x3, 0x1, 0xffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) r1 = socket$rxrpc(0x21, 0x2, 0xa) syncfs(r1) r2 = openat$cgroup_type(r0, &(0x7f0000000040), 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000140)={0x722e, 0x5, 0xcf94, 0x0, 0x7, 0xfffd}) poll(0x0, 0x0, 0x1ff) 05:12:34 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, 0x0, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:34 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:35 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x8, 0x8, 0x4, 0x7, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xcbf, 0x0, @perf_config_ext={0x3, 0x2}, 0x4000, 0x9, 0x4, 0x6, 0x1, 0x94a1, 0x8211, 0x0, 0x9, 0x0, 0x20}, 0x0, 0x9, r1, 0x3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:35 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:12:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="13000000010000000b00"/20], 0x412f02) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180)={0x0, r0}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541b, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = dup(0xffffffffffffffff) write$eventfd(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xd, 0x9, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x1f}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit, @exit, @ldst={0xfb730140d577fef0, 0x0, 0x3, 0x0, 0x3, 0xfffffffffffffff8, 0xf8bcfc97d4fae714}, @ldst={0x3, 0x1, 0x2, 0x2, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000140)='syzkaller\x00', 0x4, 0xc2, &(0x7f00000002c0)=""/194, 0x41100, 0x19, '\x00', 0x0, 0x6, r0, 0x8, &(0x7f0000000240)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0xb, 0x81, 0x40}, 0x10, 0x0, r1}, 0x78) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x33) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x1, 0x3e65957f}, 0x0) 05:12:36 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:36 executing program 3: r0 = dup(0xffffffffffffffff) write$eventfd(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR(r0, 0xc01c64a3, &(0x7f00000001c0)={0x3, 0x62, 0x8, 0x1, 0x9, 0xffff, 0x6}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000780)={{0x107, 0x3, 0x7, 0x376, 0x23e, 0x2, 0x309, 0x1}, "2a54b3da5dc952870db49c7d587aa8b094981c592091356eea89d5298bb858eeda3bce68258a96c1eb1f8f176a012041d0285a388d30bd92c57743c9e6147f8f66cfb6097e957252dfd218c384b1708014c6e6dbc314ad59f4bff9243dd45bbf16b3e2dbe0829a504a419f3acd124ebfc96276c4f5895e1b12dcb885a3cde51a7e1016b54ac03d1fba87f9759e3d7a6cd7e4a23ba9371ce20c42fc831ee972b1c92b73ef60755c32bed8a39c28882ffa803edbd0a896", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x8d6) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x6, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) r1 = dup(0xffffffffffffffff) lseek(r1, 0x0, 0x3) r2 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f00000013c0)=@usbdevfs_driver={0x1, 0x800, &(0x7f0000000340)="5b2d5bfa9d37ef67e6a627e7c4d387a27bcacd9e38baa2a8ced47b28ef2dc569785e9946525ca33f6577e59d91456703398824"}) ioctl$USBDEVFS_REAPURBNDELAY(r2, 0x4008550d, &(0x7f0000000300)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$USBDEVFS_IOCTL(r2, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect={0x0, 0x5517, 0x48000000}) 05:12:37 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, 0x0, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:37 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 823.712571][T18927] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.3' sets config #0 05:12:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x72, 0x2, 0x0, 0x0, 0x8}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') sched_setscheduler(0x0, 0x5, &(0x7f0000000300)=0x6) sched_setattr(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x3fd, 0x0) 05:12:38 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:12:38 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000340)) preadv(r1, &(0x7f0000000900)=[{&(0x7f0000000600)=""/195, 0xc3}, {&(0x7f0000000380)=""/53, 0x35}, {&(0x7f0000000780)=""/136, 0x88}, {&(0x7f00000003c0)=""/34, 0x22}, {&(0x7f0000000840)=""/171, 0xab}], 0x5, 0x1, 0x5) poll(0x0, 0x0, 0x1ff) preadv(r0, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/206, 0xce}, {&(0x7f00000002c0)=""/34, 0x22}], 0x2, 0x6, 0x6) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x1, 0x1, 0x9, 0x1, 0x0, 0x6, 0x400, 0xa, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000040), 0xb}, 0x2, 0x4, 0x27, 0x1, 0x7fffffff, 0x3, 0x6, 0x0, 0xff, 0x0, 0x100000001}, 0x0, 0xc, 0xffffffffffffffff, 0x8) 05:12:38 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:39 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:12:39 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:40 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580), 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(0xffffffffffffffff, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@private, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f00000006c0)=0xe8) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000004c0), 0x900484, &(0x7f0000000b00)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303534332c6d6f64653d30303030303030303030303030303030303030303230312c6d6f64653d30303030303030303030303130303030303031303030302c6d6f64653d30303030303030303030303030303030303030303336302c7569643d7d6b1b86bb217c34ae4d00000006097c2cd8611c28bf7ebb7a74e08ffc32e81078055e54c8d2162da4c10873750f5860565fb79ff3403f566c9bd4e7f24733f32da0cac93cf137de12eea5e1a85ddbd7cd8c2a75dd294e5e4da1148a0a1f7b4d9da62a93d6bcff", @ANYRESDEC=r0, @ANYBLOB="2c7375626a5f726f6c653d5e2c6673636f6e746578743d726f6f742cb3536673757569643d66333100313736312d333566392d633662302d661835302d63326520f686758c7a74155c7bb48bf36dd86a66393832332c657569643c", @ANYRESDEC=r2, @ANYBLOB=',\x00']) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x5, &(0x7f0000000040)={0x0, 0x37, 0x1, @thr={&(0x7f0000000240)="83a65c144d5127c898e005657e48c8face59d54ff573775a2dbb1f6366cbbff9df327e2644c23d174c6c6268e7f254a9206f67b9a6a102019d2463e76bd2007bf940bf5d1f44ead77e5e6a", &(0x7f0000000300)="54ddc615b557fb2f36f9c471e35826844611369817ee7b3d6d30667e2547e34ae1b1c5fb27743eb0cdcf2e7a0a79f8ca526a4eb4b75d4717efdd805eb079014d38e4b8f7333de52d272eae35bea544a06bae2db8da1c305f5d93cf7ccafedb63420138fd2276458d923f4e0b9423488c610ffd39e1d82fbdf54404aa61f10c66f81d2b18fadcae4542a31ca71b697ead55cfc6a3f341df0da26512aa940eca2901c427e8c491e273aad1802c2f32"}}, &(0x7f00000001c0)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) syslog(0x2, &(0x7f0000000440)=""/71, 0xfdb5) syz_emit_ethernet(0x9e, &(0x7f0000000740)=ANY=[@ANYBLOB="bbbbbbbbbbbb00000000000086dd60001d0800683afffe800000000000000000000000000000ff020000000000000000000000000001860090780000000000000000000000001f09a78ce540cd4f791153d5dea6b2590b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c4ffffbe27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a805020001000005000000000000fac600"], 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="4400000010000100"/20, @ANYRES32=r5, @ANYBLOB="000020000000000024001200140001006272696467655f736c617665000000000c000500080005"], 0x3}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="98000000", @ANYRES16=0x0, @ANYBLOB="000027bd7000fedbdf25060000004000018008000300ac1414aa060005004e20000014000400fe8000000000000000000000000000bb060005004e240000060005004e230000060001000a000000080003000000000008000200000000001c00018008000700", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r1, @ANYBLOB="060001000a00000300050000000800a600000000000000020003000000057d00"], 0x98}, 0x1, 0x0, 0x0, 0x20040010}, 0x24008840) 05:12:41 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x1000000}, 0x0, 0x1ff, 0x9}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_config_ext={0x4, 0xfffffffffffeffff}, 0x50410, 0x3, 0x9, 0x5, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x80, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x3e, 0x400402) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000280)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x8, 0x2}, 0xfffffffffffffcac) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000100), 0x4) r4 = syz_open_dev$ptys(0xc, 0x3, 0x0) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000100), 0x4) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f00000001c0)={0x8000, 0x0, &(0x7f0000000180)=[r2, r3, r4, r5, r6, r1, r0]}, 0x7) poll(0x0, 0x0, 0x1ff) 05:12:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x8, 0x2, 0x97d}]}) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0xd1000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x6) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000380)="240000001a00110214f9f4072a0904001100000000020000000200000800040003000000", 0x24) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 05:12:42 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580), 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:42 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:43 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x28, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) [ 829.661864][ T26] audit: type=1326 audit(1634188363.390:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18998 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f8759f52a39 code=0x0 05:12:44 executing program 2: syz_usb_connect$uac1(0x0, 0xb3, &(0x7f0000000000)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x40, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xa1, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@mixer_unit={0xb, 0x24, 0x4, 0x2, 0x6, "5faf48b1e843"}, @output_terminal={0x9}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x11, 0x24, 0x2, 0x1, 0x1, 0x1, 0x9, 0x9, "89ffff000034ceba90"}, @as_header={0x7, 0x24, 0x1, 0x0, 0x1}, @as_header={0x7, 0x24, 0x1, 0x4, 0x0, 0x5}, @format_type_ii_discrete={0xf, 0x24, 0x2, 0x2, 0x0, 0x8, 0x69, "b0738805dd74"}]}, {{0x9, 0x5, 0x82, 0x9, 0x8, 0x0, 0x1, 0x0, {0x7, 0x25, 0x1, 0x0, 0x1, 0x4}}}}}}}]}}, &(0x7f0000000580)={0x0, 0x0, 0x11, &(0x7f0000000180)={0x5, 0xf, 0x11, 0x1, [@ssp_cap={0xc, 0x10, 0xa, 0x7b, 0x0, 0x6, 0x0, 0xff}]}, 0x7, [{0x0, 0x0}, {0x4, &(0x7f00000002c0)=@lang_id={0x4}}, {0x0, 0x0}, {0x25, &(0x7f0000000340)=@string={0x25, 0x3, "8d86fcaa6ffe7f89ebed233534403314528d196cc72a583b3d984ff55032e38a75973c"}}, {0x3, &(0x7f0000000380)=@string={0x3, 0x3, 'Y'}}, {0x4, &(0x7f0000000400)=@lang_id={0x4, 0x3, 0x801}}, {0x0, 0x0}]}) 05:12:44 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 830.760730][T17241] Bluetooth: hci2: command 0x0406 tx timeout [ 831.460696][T17241] usb 3-1: new high-speed USB device number 9 using dummy_hcd 05:12:45 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580), 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:45 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:45 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x28, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d303030303030303030303030303030303030d7303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf60e7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cc9beb10aae14c06f9ec6f8213b414064000000000000009660b4383a00000000000000000f562ce166c782e65efe11e8cf33c134ff97f9300bd5e764b6276b1a8fe77fcbab99fcc0d8eccef51150b2de061000e0b3be5e091407511ae83091bd4774f6082a0eea3b642dddade89f60d9ae98f436617d70679335125b15b5e67a218fff030bc0416ea0a97575e901918b00b97ab0e1954ad0477171c10e52e26d8bff6dba2ff2d776aaeec3bbbcf900403e137ac75cd8ecced64a012e8d6d540353a84c64a55006af41de52674db86063b4cce7ba728caa039c601caebb351a124a1026927868932e05afb3473acc0dc03deb0c9c7cb76c28fa9b51"]) [ 831.950696][T17241] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 831.960928][T17241] usb 3-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 831.969884][T17241] usb 3-1: config 1 has no interface number 1 [ 831.976091][T17241] usb 3-1: too many endpoints for config 1 interface 2 altsetting 6: 95, using maximum allowed: 30 [ 831.987638][T17241] usb 3-1: config 1 interface 2 altsetting 6 has 0 endpoint descriptors, different from the interface descriptor's value: 95 [ 832.000906][T17241] usb 3-1: config 1 interface 2 has no altsetting 0 05:12:46 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0x3, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:46 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"/437]) poll(0x0, 0x0, 0x1ff) [ 833.631053][T17241] usb 3-1: string descriptor 0 read error: -22 [ 833.637321][T17241] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 833.646546][T17241] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 05:12:47 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:47 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:48 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x28, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:12:48 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x328000, 0x1000}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x8001, 0x100000001) [ 834.372127][T17241] usb 3-1: can't set config #1, error -71 05:12:48 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 834.627816][T17241] usb 3-1: USB disconnect, device number 9 05:12:49 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:49 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:12:50 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:50 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:50 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x28, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:12:52 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x28, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:12:52 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:52 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001a00)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000001b00)=0xe8) sendmsg$nl_route(r0, &(0x7f0000001bc0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001b80)={&(0x7f0000001b40)=@getstats={0x1c, 0x5e, 0x4, 0x70bd2b, 0x25dfdbfd, {0x0, 0x0, 0x0, r1, 0x2}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20000001) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000001300)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="200025bd7000ffdbdf250e0000006000018008000300020000001400020076657468305f746f5f68737200000000080003000000000008000100", @ANYRES32=r1, @ANYBLOB="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"], 0x470}, 0x1, 0x0, 0x0, 0x801}, 0xc0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000200)={0x0, r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x7, 0x5, 0x8b, 0x0, 0x945, 0x42014, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000140), 0x2}, 0x8, 0x7ff, 0x6, 0x4, 0x101, 0x3b83, 0xde4, 0x0, 0x8000, 0x0, 0x1}, 0x0, 0x3, r2, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x202) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x8, 0x3f, 0x49, 0x0, 0x6, 0x8084, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000240), 0x4}, 0x40020, 0x7, 0x1, 0x1, 0xcc33, 0x7, 0x5, 0x0, 0x6}, 0x0, 0x4, 0xffffffffffffffff, 0x1) 05:12:52 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600008, 0x15) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=""/220, 0xae, 0xdc}, 0x20) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180), 0xffffffffffffffff, 0x0, 0x3) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r4, 0x8008f511, &(0x7f0000000040)) 05:12:54 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:12:54 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x3, 0x3, 0x0, 0x6, 0x0, 0x1, 0x480, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x0, 0x10001}, 0x3000, 0x400, 0x1eb, 0x1, 0x9, 0x1, 0x6, 0x0, 0x4, 0x0, 0x8}, 0x0, 0xd, r0, 0x0) 05:12:55 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:56 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x28, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d303030303030303030303030303030303030d7303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf60e7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cc9beb10aae14c06f9ec6f8213b414064000000000000009660b4383a00000000000000000f562ce166c782e65efe11e8cf33c134ff97f9300bd5e764b6276b1a8fe77fcbab99fcc0d8eccef51150b2de061000e0b3be5e091407511ae83091bd4774f6082a0eea3b642dddade89f60d9ae98f436617d70679335125b15b5e67a218fff030bc0416ea0a97575e901918b00b97ab0e1954ad0477171c10e52e26d8bff6dba2ff2d776aaeec3bbbcf900403e137ac75cd8ecced64a012e8d6d540353a84c64a55006af41de52674db86063b4cce7ba728caa039c601caebb351a124a1026927868932e05afb3473acc0dc03deb0c9c7cb76c28fa9b51"]) 05:12:56 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x3f, 0xad, 0x0, 0x6, 0x14808, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x4409, 0x10000, 0x1, 0x0, 0x20000000000, 0x1f, 0x7ff, 0x0, 0xffff, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r0, 0x8) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x5, 0x80, 0xe8, 0x37, 0x0, 0x0, 0x2010, 0x7, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9d, 0x1, @perf_bp={&(0x7f0000000040), 0x8}, 0x8010, 0x2, 0x81, 0x3, 0x6, 0x3, 0x8, 0x0, 0x3, 0x0, 0x4}, 0xffffffffffffffff, 0x6, r1, 0x8) 05:12:56 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e65773a84ea1db55d327e3b1a813d1b07c05f312124b7982f7b2ecf2704d1cfc1221cb2dde6a77e2e6db1845283216c05ac606ce2782f60771671be4f1d8066b10129565d25e065d3de3671710559df6cd5678bf10a0c0dd86c4e70025f7a852a6700ca90604be2fb5d46a99a1fe185d52d6887e893d6bd6511a1433f34b9140a6949e33db1d7c71e3f988021f264a070bfb9ba4374348a3d3cc4c94290ba1e21827e68e48b07c9b5dec25b71e62101e7291e9b8d6e9ed9aef2ea2ecddcf3"], 0x29, 0xffffffffffffffff) add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 05:12:56 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) 05:12:57 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) [ 843.824892][T19160] trusted_key: encrypted_key: insufficient parameters specified 05:12:57 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_aout(r0, &(0x7f0000000780)={{0x107, 0x17, 0x80, 0x2b, 0xf8, 0x6c, 0x34c, 0x7fff}, "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x620) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:58 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = fspick(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x20, 0x80, 0x0, 0x1, 0x0, 0x7ff, 0x80100, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0x1002, 0x13, 0x4, 0x1, 0x1, 0xfff, 0x0, 0x0, 0x7, 0x0, 0x5}, r3, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='pids.current\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit={0x95, 0x0, 0x1200}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x12000000, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) 05:12:58 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:12:58 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:12:59 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000000040), 0x4, &(0x7f0000000140)) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) ftruncate(r0, 0xffffffffffffffd7) poll(0x0, 0x0, 0x1ff) 05:12:59 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:00 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = fspick(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x20, 0x80, 0x0, 0x1, 0x0, 0x7ff, 0x80100, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0x1002, 0x13, 0x4, 0x1, 0x1, 0xfff, 0x0, 0x0, 0x7, 0x0, 0x5}, r3, 0x3, r0, 0xb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='pids.current\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit={0x95, 0x0, 0x1200}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x12000000, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) 05:13:01 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x28, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:01 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:13:02 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:02 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:02 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x28, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:03 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x28, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:03 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x2, 0x80, 0x4, 0x81, 0x20, 0x20, 0x0, 0x7fffffff, 0x2090, 0x19, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x49, 0x2, @perf_bp={&(0x7f0000000040)}, 0x142, 0x1, 0xd23, 0x8, 0x5, 0x4, 0x0, 0x0, 0x81, 0x0, 0x5}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:03 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) poll(0x0, 0x0, 0x1ff) 05:13:04 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:13:05 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000400), 0x8, 0x80140) write$binfmt_elf64(r0, &(0x7f0000000780)={{0x7f, 0x45, 0x4c, 0x46, 0x80, 0x2, 0x6, 0x7f, 0x400, 0x3, 0x6, 0x0, 0x3d6, 0x40, 0x58, 0x19, 0x3ff, 0x38, 0x1, 0x7, 0x81, 0x14b3}, [{0x2, 0x1, 0x2, 0xffffffff, 0x4, 0x7ff, 0x4, 0x8}], "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1978) r1 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) r2 = dup(0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000140)={0x0, @aes128, 0x0, @desc2}) write$eventfd(r2, 0x0, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r3) openat(r2, &(0x7f0000000040)='./file1\x00', 0x0, 0x1a0) 05:13:05 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x28, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d303030303030303030303030303030303030d7303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf60e7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cc9beb10aae14c06f9ec6f8213b414064000000000000009660b4383a00000000000000000f562ce166c782e65efe11e8cf33c134ff97f9300bd5e764b6276b1a8fe77fcbab99fcc0d8eccef51150b2de061000e0b3be5e091407511ae83091bd4774f6082a0eea3b642dddade89f60d9ae98f436617d70679335125b15b5e67a218fff030bc0416ea0a97575e901918b00b97ab0e1954ad0477171c10e52e26d8bff6dba2ff2d776aaeec3bbbcf900403e137ac75cd8ecced64a012e8d6d540353a84c64a55006af41de52674db86063b4cce7ba728caa039c601caebb351a124a1026927868932e05afb3473acc0dc03deb0c9c7cb76c28fa9b51"]) 05:13:06 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x28, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:06 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) poll(0x0, 0x0, 0x1ff) 05:13:07 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:07 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x28, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) poll(0x0, 0x0, 0x1ff) 05:13:08 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:13:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[]) poll(0x0, 0x0, 0x1ff) 05:13:08 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x81080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:10 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x28, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:10 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10060, 0x0) 05:13:10 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x29c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[]) poll(0x0, 0x0, 0x1ff) 05:13:11 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:13:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_TX_LPI_TIMER={0x8}, @ETHTOOL_A_EEE_HEADER={0x2, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) 05:13:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[]) poll(0x0, 0x0, 0x1ff) 05:13:12 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65920ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a000000"]) poll(0x0, 0x0, 0x1ff) [ 859.563079][T19337] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 05:13:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB]) poll(0x0, 0x0, 0x1ff) 05:13:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@hoplimit={{0x14}}], 0xf}, 0x0) 05:13:14 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75190100ca3439d72f65262948cbb202c81dd9d1eae31df5a3e780b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x5}}]}}]}, 0x48}}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="4800000024000b0f0000000000000001067ee5fb", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000000500"/48], 0x48}}, 0x0) r5 = socket(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x5}}]}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=@ipv6_delroute={0x19c, 0x19, 0x200, 0x4, 0x25dfdbfe, {0xa, 0x80, 0x80, 0x0, 0xfc, 0x4, 0xc8, 0x9, 0x500}, [@RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @SEG6_LOCAL_NH6={0x14, 0x5, @local}}, @RTA_EXPIRES={0x8, 0x17, 0x8}, @RTA_METRICS={0xd7, 0x8, 0x0, 0x1, "c558b484992ae01cacb22a94bc2ee0e4eed6edec7c6504dd252b557b85dd4c9c2ded5cd686d046f65ab9b31c430fc5dcfd5e867afc95021d261e35a159d51ef25fda7e6898db964eb5497e13126245f02d2e11336a148b2042600c738aca977e11a28fcf61dc73ae526b673e7cf823c45e46bd747e635bccb66af06d616bd0be1a3c5d651c88a8c375a5df1ebfd29f0363352a65f825c007b50ea799a561fe0703086ee8dccc9ff152bbfcb06b05d96c31bd39cf4e06b1340bb4250df444ede9bfe41224b57a7ac752d10ab2f93f16675b15d7"}, @RTA_OIF={0x8}, @RTA_UID={0x8, 0x19, r1}, @RTA_METRICS={0x5e, 0x8, 0x0, 0x1, "9f03e651b949b2db042f6441f23123e01b33f723c83438881420f35babd836374f78802738507a9be1cde1020d76c41c834a3cc08e101c869a794fd41790ad498f05a0fc1c7bfef24a8535a3e2fee8043cbddf8d76fb613d385d"}, @RTA_IIF={0x8}, @RTA_IIF={0x8, 0x3, r4}, @RTA_IIF={0x8, 0x3, r7}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4040041}, 0x8800) recvmsg$unix(r0, &(0x7f0000004400)={0x0, 0x0, &(0x7f0000004280)=[{&(0x7f0000004000)=""/246, 0xf6}, {&(0x7f0000004100)=""/129, 0x81}, {&(0x7f00000041c0)=""/84, 0x54}, {&(0x7f0000004240)=""/29, 0x1d}], 0x4, &(0x7f00000042c0)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x118}, 0x10020) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140), 0x10000, &(0x7f0000004440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@dfltgid}, {@uname={'uname', 0x3d, '+{['}}, {@fscache}, {@debug={'debug', 0x3d, 0x2}}, {@access_user}, {@dfltgid}, {@version_9p2000}, {@privport}], [{@uid_gt={'uid>', 0xffffffffffffffff}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@euid_eq={'euid', 0x3d, r8}}, {@obj_type={'obj_type', 0x3d, '+'}}, {@smackfstransmute}, {@fsmagic={'fsmagic', 0x3d, 0xffff}}]}}) poll(0x0, 0x0, 0x1ff) 05:13:14 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x28, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:15 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:13:15 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB]) poll(0x0, 0x0, 0x1ff) [ 861.633290][T19353] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 05:13:16 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:16 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB]) poll(0x0, 0x0, 0x1ff) 05:13:16 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000fc0)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x4, 0x4, 0x5, 0xffff, 0x4b, @private2, @rand_addr=' \x01\x00', 0x80, 0x10, 0x2, 0x80000001}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8910, &(0x7f0000000140)={'ip6gre0\x00', 0x0}) 05:13:17 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc4"]) poll(0x0, 0x0, 0x1ff) 05:13:18 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:13:18 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) 05:13:19 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x28, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:19 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc4"]) poll(0x0, 0x0, 0x1ff) 05:13:20 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x80, 0xf4, 0x80, 0x4, 0xa9, 0x0, 0x7, 0x80000, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x4}, 0x10c40, 0x32ae, 0x2, 0x0, 0x7f, 0xc82, 0x3, 0x0, 0x1, 0x0, 0x770c}, r0, 0x4, r0, 0xa) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) pipe(&(0x7f00000001c0)) 05:13:21 executing program 2: sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003180), 0x0, 0x4001) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000003e80)={'syztnl0\x00', &(0x7f0000003e00)={'ip6tnl0\x00', 0x0, 0x29, 0x3, 0x3, 0x5, 0x4, @private2, @private1, 0x20, 0x8000, 0x0, 0x8}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x74, r5, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, '\x00', 0x2c}}, @FOU_ATTR_PEER_V6={0x14, 0x9, @ipv4={'\x00', '\xff\xff', @broadcast}}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x87}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x2c}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}]}, 0x74}, 0x1, 0x0, 0x0, 0x8001}, 0x20004000) sendmmsg$inet(r1, &(0x7f0000003b40)=[{{&(0x7f00000001c0)={0x2, 0x4e21, @remote}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000200)="3a68065e", 0x4}, {&(0x7f0000000240)="f124601212a41ed13188a9516434be1a417dab58c9e11664820eb6758307706b7631a3b2c486c4f9cadc29b275acf5f5b1ded1cff8710595b4c4c34d1d595a8a1ee60c32df19a5fc00960f10", 0x4c}], 0x2}}, {{&(0x7f0000000300)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000540)="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", 0x1000}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x42}}, 0x10, &(0x7f0000001940)=[{&(0x7f00000003c0)="77bf2997189f52b34546dda8db49a44653191fb852a60662d4928a0a3f8444b97ff5b090e00590cbed97ecde9689acd5c716f34843d3986267c7fbba468fc700d97f2236676808ea75d6f4d89fc7d1df0d2f1fd1301c84f54afb314c6ec343c490e424686f3247993644556440f70511522ac7a53d57e66abc5a130c29ed58378c5db0c4c7db94f9bf56143610b76179e71dce063550b59b005da892ccf8cab7b96671041c23d079a6ad7cbadb9db5fdaa753fadff29004115f64485569d", 0xbe}, {&(0x7f0000001540)="65e0359e53d32803dbcb8e61e07b4f46011c0573f5ae2673463fa023af8bb818b4841f15a25f89ab4c685f5c70658ed5283bd77e662d912ebac2c7c2ae62c908ab3e1a9b4f38f30cdcd4caa857bd5171253c1ed6920496d06b9775b0b6e675e2bcc4936f98ee3dbd8f0311b61d6f3a159a0a09d7a6d3d176f9cf371709c23fbf99cd86e05762fac3429f2fcac4bceb8ba490e5", 0x93}, {&(0x7f0000001600)="734bead03de87a6aeebd26e0e10d39742396e1033a74fbd3c3f3e24b2a1bf6418b808b2cff8d08058c0d999403c125906f47b4fef55ac8b67b38d956592ec68c077a1f636c496009", 0x48}, {&(0x7f0000001680)="13011098960764eb9065f8bc8617f65798c54cc0e4b2ef47306b228babe64cdb9785f63e58f3f85b7e472299d8508cc253caad9c487c173ef8d1810142e880b1af8a9d712f6418389bd6590d86691c9bf61d19da575edda94b24d5ce2fe08f65e0b28161dfe04a9a58950fbff6098ec47f95774c07d8950b4abd503918ecb4291fd91f51775b81f7c5868d4e", 0x8c}, {&(0x7f0000001740)="1bd5ac2116f3fa98b15489aca8901fa72a49fdbc2538bbdbe731c0440255d5e7c63d9e0336bad06e85e26a80b28333abb53ca885247d8eb92992ab868dc1bd07dddf3387149b48b520ec42bfb8b452b9a4722b30acc22e236c69c2893addcda301e2d8d75a88f837436f448521c890fb5a0fbec136b001de6ef803341b4017125a5e441e948de1029637fe283c8016fb1abf08f7945a1af744ac7062289cfd111380d4dcdca8154e0c68a8347ad164ad3c861ba6429508d22c740888e27b29064fb8e4da530c2fc1c1ca68ce24c440d08e9f1240e954fd0c596326c28bccda55cf13e0dc", 0xe4}, {&(0x7f0000001840)="d68e1fae32ccec896e6ff91ee84a750ab36099ac9dcb895eeed02e93cecd77eaa1c098e936190725fc683aeb4f81a09f460011b1fa12376648e302c863e9b766759daff36fa6cc5e8125e0d8ed3b29c7ad434f8bc23e04f559e7d3133b8aba4df9509f43626d03a37acb704ecb765158d7b932a25f2ef3c9ecc4ad49d1047d3827f2a481cc4c799c677188c22f39554c3ad7723a09410d54348b40e1870aaafcecafabe17d9e09fd3ef23c6b7d92b824c205d1abf9fc0074f94644dbff3920dba52444397968b4aa97a51742f96d4cf0c94c01c271eaf50a3d0496b5e1324a0f283698be6892c5b6b61950c87d705b711b5127c324", 0xf5}], 0x6, &(0x7f0000003ec0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="ac1414bbac1414aa0000000014000000000000000000000001000000030000000000000011000000000000000000000001000000050000000000000014000000000000000000000002000000090000000000000038000000000000000000000007000000071badac1414bbe0000001ac1414bb7f000001ffffffffac1e0001860a000000020004714b000000"], 0x188}}, {{&(0x7f0000000480)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000001b80)="8ba0ef1eca1d1ea3a29a00c61f6ba49f6b4e3a19894d0c8fc1dc9d87fddda80e459995b150fa3ac714055eb8eb1bdc3df18256967ff6ff2653257134f6cf4c238e5180a386437dfdc622b0b70720a80431f082cea0de846f50c15292b4c5c1bd9f72e1d6dc", 0x65}, {&(0x7f0000001c00)="3ad171b2277752a7bf58773b7ec6b4447905fa8f36ec90b31aeef39cc9343bad28f1cea05ba6739ac8f18eaf7ca52f4a62958e20d82902b66be3a6e8ca4d80db0015301463dafe494c0019657e19337184a108e5b7cd2b268f62f902294279ba9f33b81410aa7b6ff5b224aecd4c88be12345e62d0517b1c4dc2dfc0d4a99100a57b82484579b1c9bb537696bc064dd8ecda5fea2a9b316a55e363ba34eae928a77c6a89f66562c570a71a3bdf04c4d9d4692749725186517f1f584ab7e31a108cf36cc0c495cf9fcbc8be57a4d64e006df582a74a10025b67e34922bf157b29691d277202288e00883eaca3a3419ba2f2", 0xf1}, {&(0x7f0000001d00)="af09c06de05ca9a04760d1e92236fe97528cf2542d5459a12654ded0b1abbc7bdd6a569d970df46c724030234e385d1ae8ead414d63c4f5640d8c0349733b59fbd9e9960273caa9920b16b354ffbf9b49e325b71f5c7f48105f011fff4db8475c3aa6b63f79bb932d0f18eba33ece451f49e9ba07dc5baa67ca631163c04b7eb4da231", 0x83}, {&(0x7f0000001dc0)="a389fb8fa47350455ddc83091d56c5f79af0d53217ee0bf7d98a9b95c9b16e278b4bee2e52ce062b6de8dbd8c3dfb9c0678ef1f51ccff0f1401242f5701edfe070d00dbce4af280f03e006260b847989dab11239183a21bae7bfae69fbe65aca1c71b8aa9d8c1b12e2595302f873a7", 0x6f}, {&(0x7f0000001e40)="01c88881f7a2bfb7937f8e19a0775c77c1c2e53d3cf3a001ef54a82bbc1a7632ee53ef93c5c0befb75fa9b37eec306a99b611bf3d60f63a797baa8471feea3736371668449bf6d53e9340d636557dfd69abdd5875748eabdc066a2cb51aa0a4a77a520bcf7a18eae7a60f0fbe3d79ed0ce71e24cd1658dacec15522bbb6fd638f9853508c02d7c1b3d8552b58e716183dbb7545a080aa51292c13cf952381f202f2bd90609df66350585c089396cdf653e550d18043b0c3c6599de15b1878c0a6521a0d76f0f1125b507fe5341b3c390d16bafbb02a80551bdbe6465d0048e", 0xdf}], 0x5, &(0x7f0000001fc0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x80000001}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0xec, 0x1, 0x0, [{@remote, 0x8}, {@broadcast, 0x8}]}, @rr={0x7, 0x7, 0xd, [@dev={0xac, 0x14, 0x14, 0x17}]}, @end, @cipso={0x86, 0x1d, 0xffffffffffffffff, [{0x6, 0x8, "baa7643c1352"}, {0x7, 0x5, "160864"}, {0x2, 0x4, "ac1a"}, {0x0, 0x6, "b7aeb899"}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0xb9}}], 0x98}}, {{0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000002080)="a112fb83183560c86139cb9ac680d48327fa4b52ab498e43f2f539e13a6cb41d503d78c525ad4293f78de06b1643b3e938afdb497929a984411d476405119928f2dec7a25b9beceb8dbeaa63b02b226436fcd240d19b6028020393046861f6b5502eeee5554f5501f388b1d0e7d0fcd6b06bba5cfbf4dcd3c4546006c451a77c18fc593f370382ebc0b99453f3ef1e0ed5748d8acdc1", 0x96}, {&(0x7f0000002140)="4163f5dd4fd80850e1491fe1729246b68f2f9ec20111a1dec41d4e07cad489b5d563d7e4b864270ebf991854e6bae1203d746dab8d1424df308bc0f8", 0x3c}, {&(0x7f0000002180)="c9ab44423a5df91fb025c677672f4386366df12fec8c2bf4311d1ed2551d767e9bcbb10ab0b10dbd7b5548122b115f92726128c5f00a90d50dfd8abc46fd739cbb023abaef6eac909d9e2d39a59bdc5403b0f0afdbd5a4a2e057e6132640a018a25b347726be8ad3d7dc233ebadfadf344ae7131991275ff7fd1b4616031234333787c6ac953f6730f414749e5f25757ca91b10e65585cda8cefffbc57379b266781359ee639fbb74587a4b3e231fc9c00406f9d8b160735ed797f34f68b5d8af665cc26", 0xc4}, {&(0x7f0000002280)="7047f494bdb5a7c813aaa277697a9dd8127530468775ef8b9681c2cb9437a117c3296bce8270a8a24498c6fb18dee30ca5dbd1506a8403a1bd89268e322b10f3e5296e6ea8567357194c3a7f76c57db64078fbd4211ba1eef92a399a2a8f204464c591f696d8d8a6def897d8a78f1efe65c8a2b412fd1d415cf49d1746bb35095190c0390642e2b71b00f8158d309596f7a501cb43410a176287843381f4753ca54ffa0267fd88c989715a09ed113cceb53ce83fad1c56b05064761feda8cea916117a54cc97c0fa847dff1342eb9ed61e6e5a93f29274354a4d0472ec7a1a76ad1704b424699aca", 0xe8}, {&(0x7f0000002380)="ec4be19923346720d01ddd8bb53dba47a574af243ff913b51cdbd0e377ea49a1c97d5136951f6d1934655816d0cb163ea7e0ca7152294063159cd7cbf17e1f3392b2643477c82fe3", 0x48}, {&(0x7f0000002400)="4c7b6698f8cdbf6a866024a23410876d06ef61771d7981214a1ec859b7f93c69603e945ab0305cc59d850622c21ab694ade7a48859d75c2ca1c12229e3e0fe61ad615bb35c6fbd5ff3460c2461bb09f9b7fe619a690bc2d4d05ae8821c81326777a780c6453a4feb29b4461d6c79327284904ed078b3200e1f6a6ec26dcd5884730664552364ba9e1efa4a0a85fa6bbe7ce822b18d3b0ff839a4b6149b369aca0a5db687b8b902b1982f74bc9b93398e6ec939fb3eb34ec21fbd5604fe17db640ab36defe8c0120a6b6cfb108b5f8bfd8b7ff9ec2b783e872423bfcac8177c0df327ab62c50b93d148aaa460b4631a57af6e9a5cc84c0c39274bde193f1f6dd473f158ff54d178eb5fecbd50d397aafb73e97ba6079658d671bb4e9e21690713cb91e6c743438eb20abb66bded74afe33174e837d219aaf99eb0fa36694a90a51f44696753ed0ffe4365ea8df86551a603f1fa22ae744ea16b9921dd74cc400d9a758788299b36d2c7b58357f0c4d8a5bf90f3bb45bb00cda16a2d42f28e94d3607eba886ba34340528430ffb803a6312a51fffc2dcaf3d99d83c2edbf98f888ffd8ddbfc8d4f745018b35774ea2797d81255eae9d45e9974790d47588ded543a5d150bd2fc0a7c4fec40c51076514642e9324c7f9d6d14fd821a9e350387ce1addbe36f0b19210d303b353a1f95ae3c0778a4aa7608f731a86718fef4a7f58f8dfabb9ecfb4c727afd462e3cd6389089f07a6a0eca0b2120e9453dd20f07435b0b1a3c34c7c457d156bcf03bafc3aea8bb5db8790c195c54729287ff153ccc5b3fc8b26deb3e41b4bc8f05e4c05215b979e639cfa065243750c94ce55c2dc9d216989f2ef6edfd401903b56eefc3a46fcfceca501abbc81f1900e3a502c2e38e353eba4eba1819d53a88cf05ca92241bb05061460c8cfe50275ae13e0b665539386055b6ceb29e61fa9a724a8c891b086617346cb8ba8c7a0e90d51f98009f02402eca3e9ed30134c8eae41efba515ad3f4a2c9714fcec62e6d86791f60e9886b92e9482cb374ef4a232b2edebbf7f8cacf8c71ab1b115bb2e74fd071ba5fb99abdff5c6478ba8f601c24b3922d356458c6f5f9521e76e6e405d960faa9c893bb0df68e60ffab1e7e0aa4de3daced00b4aa9dcf3b8a036aa1d535971b37092e113618a1932492de6feb8adde30caa7c344e595372ebec0c672ae1307dbad9954def9eb86d72f1b22f325c6765ffbd50879c10918847445190502e5cbff50f05d8e3c42fe88f5dc63c584dfcafff105fadcc8abebe969b204e4edff53aed4f4286246c5a026fc6124aed03a678315c68448da9b4d0ba8c958040871cf0e8d52c250eea9ce1025e6f7c2441fe16d126c98018bd315fe9bad27d7ad0a0cf838eb1d88e7c0e6cb590214b5e6c3e7dc59214da6a8f17121f8d11730d10ebc6d644f7d1a78f5545a26113e6e75f9e72ea37e0dff86b9ca24d0f02203592ac926771db36a88424baf9e275aaf057e1c50f0df627e0d4ef65324f833f27edf417b98d9bdb981aa9e95d9833a5d60f552cca7411a6b6e08eaa8b553a4688e97f85d89b3876efed29083a129be1c90dae9406c2799cf3908b581f85004683107d57da356e012b5f5c0dcec55abc5f53e959fadf9abab36a55f17e55a4f065d83e4f7bc5c45c38f26971a2b2e6e83eac2cfb5b49e6e1eac0666055b33c1edebc586855cf7dd2ce809822b08f8e26bb9675182a2fd22811b3eb479e8350008a5e912b440a091c6cbca9d3e0870d7b0a6a2d49f2c549b7dfa3ddd63b9a9397f9714df5e218259be0c6fb023c06acbb1b31b8b45786cb5844ee5ae1ed6901fcf339581e7cda5be2cb9b5589d2615c91ce778167e3c244d0d972f57488c010e2316a7641af987889102801a3d92199a76b56ccb00eb1586b6809c5c5fbb84a1bf5a7810f8b830ecfa5134406641bb6576a3b7cadbb3df4fe6ce93f477e20f7a1ba2a08575d9a7e869382f18a033e040aeb624d2945daea189ffa9be71038662ff2f66f216328f1d1d355fe79835dc4907b43bb4bfaf7f912b68c65555daf1911c96f2ae7d5f197d680a22ed95207e26e7b45215826a6571ae25f08e066011fde5517566b283008b5ec419c7ba465c0a84d870d903ba4b7d6a72a7a406e00d55b5b00a41b99354b6e2339a54c9d4ee4819a9fea7f514b5db3449497b68ed286ec433722a18983abd943e0cf5c3f5de6253df1502a44455b74a0fdfa3e43a5dfd6626f4604f5959ad34de7deab05aa0b6f4f70e83bd3c373e319273b2130eb95a6b7561da2f50582fffabd4f68270e9e317a93196b466c62063b42b59216673bebe916cee31e96749d8391a3392af4cbe8f99bf0186554c15f5b83e723d9877d2cf8df7907b7e0b5823348e3f98044de3c3f4723399575cea7b261ff89cebea34c7afac894e7326ee900df949f68f990e31e780331a94e8d8b660bfb4e5e524e667ff89dfc8d94a7827a3f6cd6a5c1bd7e323f71504ac3eabb2041321ad1495625808cd68956ff00f0c8119b1df255e8140787fbff647f16352f8999faffd96dc23df308404fcf1d2b33ddb747451cf84283b9504dd15cacbd8d2f286ee08f5d7084cf1d94344e62c8304ad0dbc55021e9408fb939ca3f4c79762abe1a45994204e09d65ca54f95e53aa15297728dda6b0d8700a7429c05ec7ed559f3dd1290a926bd3b29646a24f2ea290cb87f472f809626b7db1a662664d0f79062cf93ad6fd526fdd9fb1ddddd2885c27c145732fe882c49088b80f4b1e8cf90edeb1ca60d3e3c156afbda34474baf76864a485160d88f6a783d1db31dad2402613c05f9a4b0d27cf60cb28d4210d5896ff8c625d39c9cd22e3d677ad467c16277d0f0bf1af75a160d5783c94be111fbbb67895d9d1683bd7d0814f12b67d2e66f8cc0c66b183316fd0f0fc5597d85d63eb02e248e8085e4b2ee6a6ea008b3cbd1e4965fa4d59d924797dd91299fe29abccd3a038aaf892605838ec250af2ab8b3fdc9aac7ce9e4ab526e15ae70b31c765c68291adca4cb1cb715b1aca3e841cbb84aaec9eae8fb1294f8d59aa1a8bdb2de9ab84f4884bbfdf7dca216f02b9dce0f2dd3495a78a96f73474036b334ee240bd704aa266d3aabb16324c0f7f9c37d58acda1ae63e9f67858d3b0e46dcdc6135ec50fcda67fd2d9d1b1faa7fb670897fcbdf70ff2457d9c51a4578b46b767950078c4794e7fd3f35b48c872fa4f57c7087098e561842d4d9c38cfae08f600fa7c2ed4831f699dbf54a47e4471f10a889751be253cc31d0be02ef38139611cdcef25def85298662181e7e87bca2d3abc23e5049c8e1a55ad9c38e28643ff81263df06e42c8ccb296f3c689533db31447c1629c5b936ce1cb65839dded1c8dc87d95c5afb304e4e410d1854bddfa4c177636d5ec57cfad0b6b8732dde0809f8911d542f04ca33849e3f0a59228d0d02b926ef828d318a15031463e6a473bfb78945f4ebc89ea31e23ab394baacdef30869a519098ac3d305ffaac1786a0c233ba535538af35649149146eb03fc9c7b19335ef7e367ad1994743f6b4d4c0f81f87ef2c4e9d36ba2097f288193872e71a3728bde899903c49cf012925e0f8bcbb6c1e3b6f2111ba9ca8de80faa87d99e3fc17222c12bf24d4898998ebc9f3e88744c0e8b286b4974b4a19934ca0b53bd258e2e8ca8fdacf9e62e41f29f951538d337249c8912950388315171d4a47b6775226fd0b65aceeda0a2acd126a65296e7bc11effb2ef50e9e9d056af05a1b8286958afb7632e573b5d50c271c233a5d3719597ebef4b61adcf2117233691c3ebdd276d0904a26c8b1c6bc033e90527b9dff33a7a3216678f9891e6b495df2c63b542f0ccaa66e9584514f61046ec9544f7093bff6ae56e08b1bb1576560acd7dc8554ff3d73ee68dd0d66e18dabba4e5ab4ebad406723aa107016565b79eade9025513b1e627dda1650c05f35c775527d7a773505f7d4af750014d38958d30924639cfe9d31b1832f58c9f75686633bd42b116efd28291fea64b8440d720fc8073f2c7f8b4cc2233acfe711e93681cd0d2d1a752190faec2f9bbbc922448a91a95a41b3f2a2556add4cbd4b5164058a0f380fb701adf3a9e2eaea901846b6fa205cd8f443c75fc5cca18d3e7d866ce95178f37a81a0b8488cd35393e3bff7e61f756aa2479f9a11f39f803ad673612fa19dd95bfd1d164f37ee2f52361ac196f7b329f960daef832e51c2fb5965eabb44d01adebfcf8b52a555d69b3efebae0cb85467f17c55b624b124d8f37e50036e9b1c7454ce1ab374cceb2f8095d7ce6e1c9ac1481580873dc56af819d96746272f0740ec409946015c9e47b0b13bb7dbc239480c0c9cad9af20c18d3e967c0eaf59b627f1f37ac5147543ccf4f2017d6e3323f5d6ab41bd942ad006911df40746f9031653f6efcba363507a9917a8253f990ba40f245497dc412d1ad9ad1041528d1134c50e4b20f7c65c67d32b03444b815ad1e3f4fa3c417c79a62f56ce2b472fe8005f8d3c146766d65749d143917880059b772e9a9f76cdc6f328f9f8ca1e4412f3b5dca32242451055df51dad751116d90b5cb0ab7f2e3bf56f888b0a95309a3242755e88e2034bcb25574e87150cecb9010a5424027b17cf3be795cf2fa24040473cee037545d8581f85423be095f81589072a95dfe09d1f1885bd91ae515705035e8d102fcfac2f8de8f5dafb7a1fc3fb4329e18b1642be9e9d5670aee4fe28a2e17a956f4607827edeb6e58930459f49adf5c58d27a56d178af415b315ae0645cf956522dab802b7f7bfb852c97342278d1d1051c64c285420f6926a0b7cf119be4d4ca97f115b772acb734a5ee8bae6576917a78c0beb2ed3766d7705df058f90d13e5a1fac086183f1ed66a74af744d22b177e34e78bf8eca9e51be92f6262c721ac93a3296e838b38aa1255ff805960a46806f009062bae4dcea0f61c96f3da975eda1dc74d89caf82d1062bfee6ec871ab530ae723a39c15e3aea43484d31c8edcf147b4560b2b65f7b6765c74ba40de0d4d7d4975cf45983c55be2ba7e75a7c2e14b2d5b070b4af2d1cd0e0ed02a246c0054bff61b5ec94ba180d17fbc0e4085446e88ff6ae7a4b6339034cefa508a79f56942f0b00cee2157095b4aa5d54517a9268572602ef5952324de6e62bc656d32a9dd2c1dc2f4de6d76a0a5f92b0d31e6ce01e0ce98fd8d2549343790da65be83eb597e544deeba668e5c167ca2df3ba6f0bc8db2a5efb4d50a9352c6033bcaa70f710051a30d4665cf6e8a026a3cee54da33c912d637f0deeaca36054b810af60b674c6f9648f5dd2e3694bd13e12b3e46cb67648ebd28286b6a32ac6338e5b7691b83a42e6bdaca00ee2c5d74289c811c0606bb0b7c52d7baf0dfbf7bcc67649cdb6f6e59aa807dc07a587d2847302219e82976aece31d4d6c8737049805eb4c50b83548fbcf346da7133362613b38c3410714b90463b9b6f4b628f615181acf6eb7cbee34496b158943942c930c2cd52eec3e80430ac2ab78ab3da177fa315b2f776fbbc080f7b38952ea44b8e676a2d6bd50bad1fa4960e72e05a2cca25e34bfaeacaa300087b752cbf66a783bcb3e463806c3fbb474e6be750b05cff370e20478d0661e64be52febf7afc0598ef8538f9d7fcd9f9273fc049103d33c420ab99cb90c213f5d9095badbd2ea1f4ba1e8211ebf1c4d7d9accb9e4f933a55ca4fe047e559bf59598855cc22cba771d86b12aa19ce34d41453eaf627a80259f7fd095c59486", 0x1000}, {&(0x7f0000003400)="69b0160b329596a29633c4a721e44ba5dd", 0x11}, {&(0x7f0000003440)="886fc7a023aa4be35a8ab840369f37b119be6e009139e32003128ef972d9581fbe41c9e33ba74aaa0dee8125dfb89994584f2096283b4b2e7442bffe1620e0dd50a9059aa2ea4ab84287f5070d71082982da60ee430eff8246afd9dd8a476659c8b78ebb29238633d5f8c124678d2fee9bb10f936c4b64d26e5a3398b043260ff0207925f6d4138d5a601250a9b58d26f673a85e9393a7bcfbf70a70c39e4eb4142e8c37d57fad5f73ab0c0814a2fdbd100523100c996a510aae65a6c4cd4ab637a8a337fb66756baed7b40cf7e23586d86f4b4c608cb723454fcb9f2cd823c668841f2df7b17c45a92ab211b4c9b2", 0xef}, {&(0x7f0000003540)="797ab399a79ccb7689b8dba0b6628d3c8ca209e2a35af017c17adc717692d0b3ad0e6c8b0edaa183b224ab694c9beaff75d71b15dd128bdedd8ee89e37cc485ac2e6ea4163562760c53c15bf781461bfb3bc7197aaa5d9f5c080786f9d082580cc1e82cb61f886735ccbd080e252", 0x6e}], 0x9, &(0x7f0000003680)=[@ip_retopts={{0x34, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x24, 0x46, 0x3, 0x3, [{@empty, 0x9eae0000}, {@local, 0x783}, {@dev={0xac, 0x14, 0x14, 0x2e}, 0x3de}, {@multicast2, 0x40000000}]}]}}}, @ip_tos_u8={{0x11}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_retopts={{0xc8, 0x0, 0x7, {[@lsrr={0x83, 0xf, 0xc9, [@rand_addr=0x64010101, @loopback, @private=0xa010101]}, @end, @cipso={0x86, 0x35, 0x2, [{0x1, 0x11, "85107e6c93ee92190a9035fb8b2387"}, {0x1, 0xc, "3149e43b9daf1545cd86"}, {0x1, 0x12, "c8dc29071f72b772a082d8de74c328a1"}]}, @cipso={0x86, 0xd, 0x2, [{0x5, 0x7, "1208852702"}]}, @timestamp_prespec={0x44, 0x34, 0x68, 0x3, 0xf, [{@broadcast, 0x7664b59b}, {@loopback, 0x7ff}, {@local, 0x7fff}, {@local, 0x81}, {@rand_addr=0x2, 0x51f}, {@local, 0xf0}]}, @rr={0x7, 0xb, 0x6, [@broadcast, @empty]}, @timestamp_addr={0x44, 0x14, 0xfb, 0x1, 0xb, [{@multicast2, 0x4}, {@dev={0xac, 0x14, 0x14, 0xc}}]}, @generic={0x94, 0x10, "983be387127f0588cc68558dd513"}]}}}, @ip_retopts={{0x74, 0x0, 0x7, {[@cipso={0x86, 0x62, 0xffffffffffffffff, [{0x7, 0x11, "54413ba9a8abe398da96c955ba6fc9"}, {0x5, 0xf, "932412b319515bae0a2d153945"}, {0x6, 0x11, "6f11003baa8d101401f899d9d89c12"}, {0x1, 0x11, "f4f144b2511202dd8b2d0a85cd81bd"}, {0x7, 0xe, "6daa492510dadb39934f965d"}, {0x7, 0xc, "8479b838ca0e26f99ad6"}]}]}}}], 0x1d8}}, {{0x0, 0x0, &(0x7f0000003a80)=[{&(0x7f0000003880)="31357dd87e025aeb12ddd8e5f119d0266b628d2d224ca26189ad4cd0a38f58e6379a6b2d93912fe34a9f770faf8a2fd925fb8d7ad7a8503f35645ffbb8a31cfa87f0fc363def72457f5c1c06c4732596901d4ac1ce6d6ddccb384b33621ec135941c241eeb70f0744a567b914917ed566563d05c1855f872fc7ede191d3631f30e2b8292cbe5cd0f085236", 0x8b}, {&(0x7f0000003940)="ba879594045d4c405970e872ab74c53c22b5399b473dc4b6dfd87312d9c5a4e9d4d7017f2c0b18c6c834a103202d652513228e88c51c8f9f6f98835706ebdc731a18ab65d0fe7dc574bc350cbfa74f3c8a13749c157c319010c3a11ca25020afa79ea4adaa56aeedbb45bc7d6df102fbcd5498f00da6cbe319b72e95616c988854f409a3f21209c8e79689c1f31eb27723c99f9e79f9d3eb28cb68a8200342441131c5ab5d93ce53399d96d8d3377a59c25c30d10e785b8178865b6de5cd91beb52480aef2b9e7fe4f3f699b9b671f7c650e702399fa97b86e624dfb2578fe0cc8b896df0c5a5db7f9160fe88f73ef6f8eda78542c9e0cd4", 0xf8}, {&(0x7f0000003a40)="8feae64b194749d42f8a5f7a31879a4370e0dd9745c6f2e715ff1ba4c84555a65c5cb5d33a1d", 0x26}], 0x3, &(0x7f0000003ac0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x80000000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}], 0x78}}], 0x6, 0x20040000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000004c0)={'batadv0\x00', 0x0}) pipe(&(0x7f0000000600)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r7, 0x89f7, 0x0) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000003d00), r4) sendmsg$BATADV_CMD_GET_DAT_CACHE(r7, &(0x7f0000003dc0)={&(0x7f0000003cc0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000003d80)={&(0x7f0000003d40)={0x34, r8, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xfa}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x60000000}, 0x4000000) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000500)={@mcast1, 0x0, r6}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8936, &(0x7f00000000c0)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x8, r6}) 05:13:21 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:13:21 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:21 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x28, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:21 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc4"]) poll(0x0, 0x0, 0x1ff) [ 869.667101][ T1194] ieee802154 phy0 wpan0: encryption failed: -22 [ 869.673478][ T1194] ieee802154 phy1 wpan1: encryption failed: -22 05:13:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000005c40)=[{{&(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x4}}, 0x10, 0x0}}], 0x1, 0x24048084) 05:13:24 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:25 executing program 3: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) gettid() ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000000000000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f02, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xb, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x6, 0x3c, 0x1, 0x0, 0xca9d, 0x1000, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x100, 0x1, @perf_config_ext={0x40, 0x8}, 0x0, 0xfffffffffffffffb, 0x80, 0x1, 0x0, 0xfffffff7, 0x82c, 0x0, 0x7, 0x0, 0x8}, r0, 0xe, r1, 0x1) poll(0x0, 0x0, 0x1ff) 05:13:25 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:25 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:13:25 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x400000, 0x0) 05:13:26 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:26 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) close(r2) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000140)="9e7cdb2a218f8e70d5da6df9f0b08b2091b6fd123b023314a9d15cf782037bc3c3754a9c6b530702da3057595b10d981fa78d0116be06161b0a807ec9f969541045c4df5ffcef7823506811d4c1141d45a2cb61369fddf40215a95e5fd", 0x5d, 0x10000}, {&(0x7f00000001c0)="2607ec5e97c74166ab18a354e1efd00516acb7ab053b7f649af47ccb225f3b373b0613457cec007460b9fae18255c0bd2417dff738a16a7d1c65136321515a47a485bf59ab3fc1643d3b", 0x4a, 0x8}], 0x920008, &(0x7f00000002c0)=ANY=[@ANYRESOCT=r0]) poll(0x0, 0x0, 0x1ff) 05:13:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000003c0)={0x178, 0x3a, 0x400, 0x70bd2d, 0x25dfdbfe, "", [@generic, @generic="66803e4498de3157e3891d3d053b5ad64f0027a37a7cb18f420d614a14babec278d32c50960307ddd679106f537e378262c2279ec99219a4946dbddaa756eba725db9d9d0714ea2b6e87bcfdcfe43ea1bbe9b5d8ca94b9c67c78370a755d72b80582267627da4bcf419099e7f169ef2c79584a5b75acb1ed4bed9562f590d7e861001419342dddf06f558ef118141befa685e9a367e04b7eb5d82a2312", @generic="8106a69a1bea7bb572aeef7fa537d032f3e320eb734db0d81ed7a3635ecb38bf5018a5880eaf3ea8f8691c581b9867acde7c67690a84ac8abf342c17996d23c2a0aa8ed5f1cb736fd9c86ca09e6e31b5266ffe35efa0ef2d8b9754591fb429c1b7343cf34b41bf79fca70f3887f58346b7317b5f7e4af6380ff9a309225d7e4751ae2b25d0aa166b75046e500e9b6dbb0b571e2dc3d5681ef8ea9475fb53c45a4372063c476b62dc9fb745321ff7a44d3154effe121d76b25b7f87f8e45be642c21fed6e8f04580ed1"]}, 0x178}, {&(0x7f0000000ac0)=ANY=[@ANYBLOB="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", @ANYBLOB], 0x1254}, {&(0x7f0000006080)={0x10, 0x13}, 0x10}, {&(0x7f0000001d40)={0x10, 0x2a}, 0x10}], 0x4}, 0x0) 05:13:27 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:28 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:13:28 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:28 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, 0x0, 0x0, 0xfffffffffffffffa) 05:13:30 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) pread64(r0, &(0x7f0000000280)=""/187, 0xbb, 0xffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x1000040, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) clone(0x1304080, &(0x7f0000000140)="057ac89d4dd0ca80a35d9ddc8761001c820f8dd155ba5a707ccf6fcbc7fc570d2e5f8b839f206bc29afb76a78c2952fea1b58ffe1c7ba8e767c30cbe05900dbfb4a5b5a89fe8eb5fde06828047d340c4274c153d502b4fd7bdb0c2c6e10660526fbbea8d", &(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000200)="334946f632299262d5398dfe35f31989ae625f9964b872ab6f76e924293229e3eafd206d1fe2f49499fe58826e179e4eedc44a0400f925176289adc37201fe1d7eaec84237ae412ef22fd8359d242308f30db5f76bec5d219789bb9a3433e11d25e4c9bb276731de74") 05:13:30 executing program 2: perf_event_open(&(0x7f0000001200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:13:30 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:31 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:32 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:13:32 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:32 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) io_setup(0x2, &(0x7f00000003c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000200)=[&(0x7f0000000100)={0x0, 0x0, 0x2, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x2}]) 05:13:34 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:34 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) mknodat$null(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x103) 05:13:35 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:35 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:36 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:13:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x201}, 0x1c}}, 0x0) 05:13:36 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbd"]) poll(0x0, 0x0, 0x1ff) 05:13:36 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:37 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:37 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:37 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x1c, 0x0, 0x81, 0x3, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000300), 0x3}, 0x2000, 0xfff, 0x3, 0x7, 0x3, 0x61e, 0xfe01, 0x0, 0x3, 0x0, 0x8000}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x3) clone(0x0, &(0x7f0000000140)="c84187c22dbdce3063bb5ec46b90891e175cc4fa972854af93b67da1e5e0936ac09e40a2f079054adf4258e599ce1a7fa5d8403bc2978b4115f52e7c4d9463362f3894f07b730a10b671b2b252f952ba8cef77ee188656e572ab07745ddba1c737870a7a2fb52e4ecf91814c9019a3bbab03d5719bd55e24ea276ada62635e17c38b2ac84bec623904de38", &(0x7f0000000040), &(0x7f0000000200), &(0x7f0000000240)="2524202f9613ce36a08adf43356d9761a845755f198cca4618ea448a8d44cda342d86fc67cf839107df74911b216ed9f51da2056018b5d8f28715d7966326fa91a3b0279afe6e47da82ae6ca0e3f8984379a611bde9793370d9662bc7337735474393421e51a47565d61eda983f0bb0b7d222bf61cfdd112bb63afb2e3c42d1ea9") 05:13:38 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000003c0)={0x1, &(0x7f0000000340)=[{0x3d}]}) 05:13:38 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b4140"]) poll(0x0, 0x0, 0x1ff) 05:13:39 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x8800, 0x0) ioctl$KVM_SMI(r0, 0xaeb7) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:40 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:13:40 executing program 2: socket$inet(0x2c, 0x3, 0x0) 05:13:40 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b4140"]) poll(0x0, 0x0, 0x1ff) 05:13:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@proc={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)=[{&(0x7f00000003c0)={0x220, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4}, @generic="f54c9fd666a94a027f35ff975fb41bff6ad05c857f4fb71e9f0bdb0fb3c3fd46585e8da7b6c91ef2c7fbae0adf9787f09b9367b98fb4d7648d872ecd2c855228b370b50fb6511959a1b060a954134387a21f900e7bfe3a8822d4a957820e42128f606ec6ff919d992d1a4e8a5d06a90d6995fbb681638233c910ceaebb822030c213f754a4aa6a6077ae1b3a9d88a20fa2374ca1c00eea7dc8eb267993f725fdc0e9", @generic="66803e4498de3157e3891d3d053b5ad64f0027a37a7cb18f420d614a14babec278d32c50960307ddd679106f537e378262c2279ec99219a4946dbddaa756eba725db9d9d0714ea2b6e87bcfdcfe43ea1bbe9b5d8ca94b9c67c78370a755d72b80582267627da4bcf419099e7f169ef2c79584a5b75acb1ed4bed9562f590d7e861001419342dddf06f558ef118141befa685e9a367e04b7eb5d82a2312", @generic="8106a69a1bea7bb572aeef7fa537d032f3e320eb734db0d81ed7a3635ecb38bf5018a5880eaf3ea8f8691c581b9867acde7c67690a84ac8abf342c17996d23c2a0aa8ed5f1cb736fd9c86ca09e6e31b5266ffe35efa0ef2d8b9754591fb429c1b7343cf34b41bf79fca70f3887f58346b7317b5f7e4af6380ff9a309225d7e4751ae2b25d0aa166b75046e500e9b6dbb0b571e2dc3d5681ef8ea9475fb53c45a4372063c476b62dc9fb745321ff7a44d3154effe121d76b25b7f87f8e45be642c21fed6e8f04"]}, 0x220}, {&(0x7f0000000ac0)=ANY=[], 0x1254}, {&(0x7f0000006080)={0xa10, 0x0, 0x0, 0x0, 0x0, "", [@generic="ed09866eb566457edcf8107ef826b3db5b58338ad2ec1e23c7814a51635cfc9279afbf1afa06a2e5171c817bf0155e013f080514a7fae4f567fcafc4f6c08b7a9fd7c2f8c3f896506768d5ec7a39f2950dd684048dd379a2f5defe48576317652a2145d1f66a1776b0dcc4e0838b98bc193530ae111de529a8d64ef96d28ff81a125273433dba869e2101775b3", @nested={0x96d, 0x0, 0x0, 0x1, [@generic="949828fba2c97470c442f109a46a28e33d7a1705ea57340a7a73b2da81e26d2b93d1ad9b00c11ea703540636c819d36a1544507931ce4afe99158006bcf43661a404c826e362f62130d03016dda1c40901e5", @generic="ef1e4c520b6f5ab844f24eef723bad5378878700ea74f38c43c3ec6eed3d315f6bd1173b744468fed061a9c78a040bebb5c4d65177a65811aac963f59dc964915c7d28d29ddad9c253c2ed40fbbac37898f57d54482fb6c22e4f0e38451d0de7726ff4e2f857d002e367114eb2ed89b8cd05bc99568fd0b3f660de3cbf005177e5", @generic="e76b0129b05d78cc1ec3ba08cc5abdfda53a955b929fa65067cdb2fa07168437e4cc0e3b8b6257c9402421d7d7a959f9f670dddc07ccf72489915b5f67a2bc88f8c6ee5592a9eb3c8793971e61fcd706c475aae763ff02d21c96c09ba8939e9ff6eadf705fc320b7ad595f7968027a28c96254a8fe6d17588149afeec2c4b20a97689a6d237f759734bf4e214343ed89a23d90bb571be49288ec9e0a878b9e64f502839c5b74a6a702d0d8239d9bb9c434d6b01dcfd63e320061fd1ace88278b0a8aa433c735f3c866b30a69eec565208a8a7e84b2beab2cdeceb1201956eefa1abaefcd353f0a585e9650a8aeff5cfd69660c36", @generic="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"]}]}, 0xa10}], 0x3}, 0x0) 05:13:42 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:42 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:43 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:13:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) io_setup(0x6, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000001600)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x3, r0, 0x0, 0x0, 0x0, 0x0, 0x2}]) 05:13:44 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:44 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:45 executing program 2: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x7ff}, &(0x7f0000000100)={0x0, r0+60000000}, 0x0) 05:13:46 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, 0x0, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:13:46 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:46 executing program 2: syz_mount_image$f2fs(0x0, &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000800)='./file0\x00', &(0x7f0000000f80), 0x0, 0x0, 0x0) 05:13:47 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:47 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000121000/0x4000)=nil, 0x4000, 0x1000002, 0x110, r1, 0xdefd3000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r2 = gettid() tkill(r2, 0x3a) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) r3 = dup(0xffffffffffffffff) write$eventfd(r3, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc2, 0x80, 0x81, 0x0, 0x2, 0x8820, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x2, 0x5}, 0x2010, 0x1ff, 0x5, 0x7, 0x5, 0x80000001, 0x100, 0x0, 0x8, 0x0, 0xc2}, r2, 0xe, r3, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x50, 0x0, 0x0, 0x94, 0x0, 0x1, 0xa401, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x7, 0x9, 0x7, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = accept4$nfc_llcp(r3, 0x0, &(0x7f00000003c0), 0x80000) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r5, 0x84009422, &(0x7f0000001b80)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_DEV_INFO(r4, 0xd000941e, &(0x7f0000000b80)={r6, "b8e5b22996dadb75b75586249809dba9"}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000040)={0x2, 0x2}) poll(0x0, 0x0, 0x1ff) 05:13:48 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) sendmsg$nfc_llcp(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={0x10}, 0x10}, 0x0) 05:13:49 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:49 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file1\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="6f11e3debc4673782e00da2065ddd74c6c3896c3836a0baa38f8ffe44f3072bdcf6d70b84046f8dad9be7e03df9bed294d1ff26e174641a2cfb066433eb6e8e28e9dc12ede41dc82afa4e05f078637786963904b93729a0154f62fb9dcfebccd7034aea89cad28c08628958ec4845b6e565d70ebc072f7fdd43c2219ca8801b55b662eaea5"], &(0x7f0000000380)=""/70, 0x46) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:50 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, 0x0, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:13:51 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000380)={0x0, 0x40, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r1, 0x401, 0x0, 0x0, {{}, {}, {0xfffffffffffffdc6}}}, 0x24}}, 0x0) 05:13:51 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660"]) poll(0x0, 0x0, 0x1ff) 05:13:52 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) r1 = dup(0xffffffffffffffff) lseek(r1, 0x0, 0x3) fanotify_mark(r1, 0x98, 0x8, r0, &(0x7f0000000040)='./file0\x00') 05:13:52 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:52 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001280)) 05:13:53 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, 0x0, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:13:54 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) 05:13:54 executing program 2: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000100)={0x0, r0+60000000}, 0x0) 05:13:54 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:56 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:13:57 executing program 2: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}}}}]}}, 0x0) 05:13:58 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b438"]) poll(0x0, 0x0, 0x1ff) 05:13:58 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0), 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) [ 904.685941][ T7926] usb 3-1: new high-speed USB device number 10 using dummy_hcd [ 905.186207][ T7926] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 905.197686][ T7926] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 905.208087][ T7926] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 905.217873][ T7926] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 905.227579][ T7926] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 05:13:59 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x0) 05:13:59 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 05:14:00 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x0) 05:14:00 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x5}}]}}]}, 0x48}}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYRES16, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000ac0008801c00000000000500050000000000000009000000000000000700000012000200080007000500090004009a9e030000001c00010005060500000000280000000004000000090000000100000006000200f5b3af8bdee63d1d600d6848a1f65f4506000001000000010000000400000002000000030000000a0002f59b0c02007f0000001c00010040670500010000000100000001000000ff00000006000000100002000900070057070000e1ff0900000000000000000000b6d325676c86424e73e414b2dc74dd"], 0xd0}}, 0x0) r5 = socket(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x5}}]}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000007c0)=@ipv6_delroute={0x1a0, 0x19, 0x200, 0x70bd2d, 0x25dfdbfe, {0xa, 0x80, 0x80, 0x0, 0xfc, 0x4, 0xc8, 0x9, 0x500}, [@RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @SEG6_LOCAL_NH6={0x14, 0x5, @local}}, @RTA_EXPIRES={0x8, 0x17, 0x8}, @RTA_METRICS={0xd7, 0x8, 0x0, 0x1, "c558b484992ae01cacb22a94bc2ee0e4eed6edec7c6504dd252b557b85dd4c9c2ded5cd686d046f65ab9b31c430fc5dcfd5e867afc95021d261e35a159d51ef25fda7e6898db964eb5497e13126245f02d2e11336a148b2042600c738aca977e11a28fcf61dc73ae526b673e7cf823c45e46bd747e635bccb66af06d616bd0be1a3c5d651c88a8c375a5df1ebfd29f0363352a65f825c007b50ea799a561fe0703086ee8dccc9ff152bbfcb06b05d96c31bd39cf4e06b1340bb4250df444ede9bfe41224b57a7ac752d10ab2f93f16675b15d7"}, @RTA_OIF={0x8, 0x4, r0}, @RTA_UID={0x8, 0x19, r1}, @RTA_METRICS={0x5e, 0x8, 0x0, 0x1, "9f03e651b949b2db042f6441f23123e01b33f723c83438881420f35babd836374f78802738507a9be1cde1020d76c41c834a3cc08e101c869a794fd41790ad498f05a0fc1c7bfef24a8535a3e2fee8043cbddf8d76fb613d385d"}, @RTA_IIF={0x8}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWTUNNEL_IP6_HOPLIMIT={0x5}}, @RTA_IIF={0x8, 0x3, r7}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x4040041}, 0x8800) mount$overlay(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140), 0x4010, &(0x7f0000000180)={[{@nfs_export_on}], [{@uid_lt={'uid<', r1}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}]}) 05:14:01 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0), 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:14:01 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x0) [ 907.616444][ T7926] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 907.625552][ T7926] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 05:14:01 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x12, &(0x7f0000001e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:14:01 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="3030303030303030303030303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc26563d6da682810f0c2037877884a66055193237400fca927485288efe2a73a2c997674466280317abeb6c34b9e173c0d9686ecc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e052bc46aaf5ee7f12f0baaeb6fc070f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb76e0547a93b5dd33afb87f757a38a5b75195709ca3439d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6372e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b414064000000000000009660b4383a"]) poll(0x0, 0x0, 0x1ff) [ 908.292789][ T7926] usb 3-1: can't set config #1, error -71 05:14:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x1261, 0xffffffffffffffff) [ 908.556097][ T7926] usb 3-1: USB disconnect, device number 10 05:14:02 executing program 2: mount$fuseblk(0x0, 0x0, 0x0, 0xb6a67fbead5f1b87, &(0x7f0000002240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}}) 05:14:03 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 05:14:04 executing program 5: io_setup(0x2, &(0x7f00000003c0)) io_setup(0x4, &(0x7f0000000040)=0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) io_submit(r0, 0x0, 0x0) 05:14:04 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f00000004c0)={0x1f, 0x0, @fixed, 0x0, 0x1}, 0xe) 05:14:05 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0), 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:14:05 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)={0x0, 0x0}) r2 = dup(0xffffffffffffffff) write$eventfd(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0xd6, 0x4, 0x81, 0x0, 0x0, 0xffffffff, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001, 0x2, @perf_config_ext={0xfffffffffffffffc, 0x9}, 0x5460, 0x4, 0x8, 0x2, 0x5, 0x8, 0x6, 0x0, 0x7, 0x0, 0x7}, r1, 0x7, r2, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x2, 0x2, 0x40, 0x20, 0x0, 0xfff, 0x1000, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2fa, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x40, 0x1f, 0xb7, 0x0, 0x8, 0x0, 0x3f, 0x0, 0x4, 0x0, 0x3ff}, 0xffffffffffffffff, 0x10, r3, 0x9) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000003c0)={'erspan0\x00', &(0x7f0000000600)={'syztnl1\x00', 0x0, 0x10, 0x80, 0x7f, 0xb735, {{0x28, 0x4, 0x3, 0x3f, 0xa0, 0x67, 0x0, 0x2f, 0x4, 0x0, @multicast2, @broadcast, {[@noop, @end, @timestamp_addr={0x44, 0x34, 0x34, 0x1, 0x2, [{@multicast1, 0x4}, {@multicast1, 0x100}, {@broadcast, 0x4}, {@broadcast, 0x3}, {@broadcast, 0x2}, {@remote, 0x4f}]}, @timestamp={0x44, 0x10, 0xf1, 0x0, 0x0, [0x3, 0xfff, 0x9]}, @timestamp_addr={0x44, 0x14, 0x3d, 0x1, 0x6, [{@loopback, 0x93}, {@broadcast, 0x1}]}, @end, @timestamp_addr={0x44, 0x2c, 0x17, 0x1, 0x0, [{@empty, 0x400}, {@multicast2, 0x1}, {@broadcast, 0x8000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffbff}, {@local, 0x8001}]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) bind$packet(r2, &(0x7f0000000400)={0x11, 0xd, r4, 0x1, 0xbc, 0x6, @broadcast}, 0x14) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x50800, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:14:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) sendto$packet(r1, &(0x7f0000000140)="8c63e286fd4bee57c605cbbcb8c930fbf7f349f43cb91df5e3829afb8571d19bbbdf5bf1712f077a", 0x28, 0x0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) 05:14:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000580)={0x0}}, 0x0) 05:14:06 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 05:14:08 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:14:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) io_setup(0x6, &(0x7f0000000100)=0x0) io_submit(r2, 0x3, &(0x7f0000000340)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3, r1}, 0x0]) 05:14:08 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3a) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0xdc, 0x7f, 0x2, 0x1, 0x0, 0x3ff, 0x10400, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000300), 0x7}, 0x800, 0x6, 0x0, 0x8, 0x3, 0x4, 0x3, 0x0, 0x7fff, 0x0, 0x2f4}, r2, 0xe, r0, 0x1) preadv(r1, &(0x7f0000000280)=[{&(0x7f0000000040)=""/27, 0x1b}, {&(0x7f0000000140)}, {&(0x7f0000000180)=""/137, 0x89}, {&(0x7f0000000240)=""/44, 0x2c}, {&(0x7f0000000780)=""/4096, 0x1000}], 0x5, 0x6, 0x100) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 05:14:08 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x16, 0x0, 0x1f, 0x30, 0x0, 0x1}, 0x40) 05:14:09 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[]) 05:14:09 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:14:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f0000000780)) 05:14:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)={0x28, r1, 0x1, 0x0, 0x0, {{0x7}, {@val={0x8, 0x2}, @val={0xc}}}}, 0x28}}, 0x0) 05:14:12 executing program 5: syz_emit_ethernet(0x1a, &(0x7f0000000000)={@empty, @dev, @val={@void}, {@llc_tr={0x11, {@snap={0x0, 0x0, 'v', "34c878"}}}}}, 0x0) 05:14:12 executing program 2: socket$netlink(0x10, 0x3, 0x64) 05:14:13 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[]) 05:14:13 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:14:13 executing program 2: fork() fork() wait4(0xffffffffffffffff, 0x0, 0x1, 0x0) 05:14:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) recvmsg(r0, &(0x7f0000002480)={0x0, 0x0, 0x0}, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r1) 05:14:14 executing program 3: perf_event_open(&(0x7f0000000700)={0x5, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4, 0x61181cf3a63751b2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f}, 0x2, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000240)=0xffffffffffffffff) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) write$eventfd(r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x81, 0x81, 0x0, 0x0, 0x8, 0x10800, 0xa, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000180), 0x5}, 0x0, 0x7, 0x4, 0x0, 0x6, 0x3f, 0x5, 0x0, 0x7, 0x0, 0x1fffc000000}, r0, 0x10, r1, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x4000c0) ioctl$SNDCTL_DSP_SETTRIGGER(r2, 0x40045010, &(0x7f0000000140)) 05:14:14 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[]) 05:14:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000003040)={0x0, 0x0, &(0x7f0000003000)={&(0x7f00000009c0)=@ipv6_delroute={0x34, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_METRICS={0x4}, @RTA_ENCAP_TYPE={0x6}, @RTA_MULTIPATH={0xc, 0x9, {0x8}}]}, 0x34}}, 0x0) 05:14:16 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000001840), 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000000)=""/245) 05:14:17 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:14:18 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000000840)=[{&(0x7f0000000140)=""/240, 0xf0}, {&(0x7f0000000240)=""/89, 0x59}, {&(0x7f00000002c0)=""/77, 0x4d}, {&(0x7f0000000340)=""/187, 0xbb}, {&(0x7f0000000600)=""/86, 0x56}, {&(0x7f0000000680)=""/119, 0x77}, {&(0x7f0000000780)=""/153, 0x99}], 0x7, 0xffffffad, 0x7) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ppoll(&(0x7f0000000400)=[{r0, 0xc000}], 0x1, &(0x7f00000008c0)={0x0, 0x989680}, &(0x7f0000000900)={[0x6]}, 0x8) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) r2 = dup(0xffffffffffffffff) write$eventfd(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000940)={0x0, 0x6}, 0x8) poll(0x0, 0x0, 0x1ff) 05:14:18 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000240)=@security={'security\x00', 0xe, 0x4, 0x2d4, 0xffffffff, 0x0, 0x2e0, 0xd4, 0xffffffff, 0xffffffff, 0x2e0, 0x2e0, 0x2e0, 0xffffffff, 0x4, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @dev, 0x0, 0x0, 'team_slave_1\x00', 'veth1\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x9c, 0xc0, 0x0, {}, [@common=@inet=@l2tp={{0x2c}}]}, @common=@inet=@SYNPROXY={0x24}}], {{'\x00', 0x0, 0x70, 0x94}, {0x24}}}}, 0x330) 05:14:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x15, 0x7, &(0x7f0000000000)=@framed={{}, [@ldst, @call, @btf_id]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:14:19 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB]) 05:14:20 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x15, 0x6, &(0x7f0000000000)=@framed={{}, [@alu={0x4}, @jmp={0x5, 0x0, 0xc, 0x0, 0x0, 0xfffffffffffffffc}, @exit]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:14:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.events\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) close(r0) socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000040)=0x2) 05:14:20 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:14:22 executing program 3: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f0000000040)={r0}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 05:14:22 executing program 5: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) getpid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x402862, 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x3211400, 0x0) mount$bpf(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580), 0x84470, &(0x7f00000005c0)={[{@mode={'mode', 0x3d, 0x8}}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@euid_lt={'euid<', 0xee00}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@dont_appraise}, {@dont_appraise}, {@seclabel}, {@seclabel}, {@fowner_lt}, {@audit}]}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000440)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="2c6d61cbe43d4de053a00c81f16ba926e7187d6b06b04e0842929d7868529a4403bc73be5d82d90458bc90c1ea657083ccda19bc912d611648b400c1bd398cdcf603e629796e48e45640d418b3982613ab0094a8b6cd861d00581034f55c57617965266c8d3db8b6e78fd8fa8e287351300324545c4906da9ccbe100"]) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001200)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x2, 0x0, 0x1}}, 0x10, &(0x7f00000011c0)}, 0x0) 05:14:22 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB]) 05:14:23 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000140)='vfat\x00', 0x4) sendfile(r0, r1, &(0x7f0000000180)=0x5, 0x9) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file1/file0\x00', 0x0, 0x10}, 0x10) splice(r3, &(0x7f0000000240)=0xffffffffffff4f2b, r2, &(0x7f0000000280)=0x8, 0x5, 0x1) 05:14:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x1}]}, {0x0, [0x61, 0x30, 0x2e]}}, &(0x7f0000000140)=""/238, 0x29, 0xee, 0x1}, 0x20) 05:14:24 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) [ 931.128841][ T1194] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.135251][ T1194] ieee802154 phy1 wpan1: encryption failed: -22 05:14:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x1}]}}, &(0x7f0000000140)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 05:14:25 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x80, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xbe, 0x9f, 0x7, 0x1, 0x0, 0x10000, 0x40, 0x9, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0xec2, 0x2}, 0x500, 0x6, 0x4, 0x9, 0x0, 0x2, 0x7, 0x0, 0x4, 0x0, 0x3}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) poll(0x0, 0x0, 0x1ff) clone(0x80000, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="ed5c58904d0d6cfe1b9759dc9622509c6d6ba56e52018cb4550af4e80645a988d5f84041") 05:14:26 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8910, &(0x7f0000000080)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 05:14:27 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x8a4c3, 0x184) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x50410, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="4400000010000100"/20, @ANYRES32=r2, @ANYBLOB="000020000000000024001200140001006272696467655f736c617665000000000c000500080005"], 0x3}}, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0xb, 0x9, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x81}, [@btf_id={0x18, 0x2, 0x3, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x90}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @generic={0x4, 0x8, 0xd, 0x5, 0xd6}]}, &(0x7f0000000280)='GPL\x00', 0x7ff, 0xa2, &(0x7f00000002c0)=""/162, 0x40f00, 0x12, '\x00', r2, 0xb, r0, 0x8, &(0x7f0000000380)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x9, 0x1800000, 0x80}, 0x10, r3, r0}, 0x78) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="4400000010000100"/20, @ANYRES32=r5, @ANYBLOB="000020000000000024001200140001006272696467655f736c617665000000000c000500080005"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@ipv6_getaddrlabel={0x38, 0x4a, 0xf00, 0x70bd2a, 0x25dfdbfb, {0xa, 0x0, 0x10, 0x0, r5, 0x7}, [@IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_ADDRESS={0x14, 0x1, @private1}]}, 0x38}, 0x1, 0x0, 0x0, 0x80000}, 0x10) 05:14:27 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002540), 0x441, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000002580)=0x29440, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x10000, 0x800}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000024c0)=0x10, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000100), 0x4) preadv(r1, &(0x7f0000002440)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/249, 0xf9}], 0x6, 0xfffff000, 0x5) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000002500)={&(0x7f0000000000)=""/66, 0x10000, 0x1800, 0x0, 0x2}, 0x20) 05:14:27 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xdfffffff, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x0, 0x800}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x60000, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB]) 05:14:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)=@req={0x28, &(0x7f0000000040)={'caif0\x00', @ifru_mtu}}) [ 935.688138][T19931] EXT4-fs: error -4 creating inode table initialization thread [ 936.142789][T19931] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. [ 936.151364][T19942] EXT4-fs (sda1): Unrecognized mount option "mode=00000000000000000000010" or missing value [ 936.389460][T19950] EXT4-fs: error -4 creating inode table initialization thread [ 936.520209][T19950] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. [ 992.556871][ T1194] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.563307][ T1194] ieee802154 phy1 wpan1: encryption failed: -22 [ 1053.955085][ T1194] ieee802154 phy0 wpan0: encryption failed: -22 [ 1053.961464][ T1194] ieee802154 phy1 wpan1: encryption failed: -22 [ 1090.420815][ T27] INFO: task syz-executor.5:19944 can't die for more than 143 seconds. [ 1090.429185][ T27] task:syz-executor.5 state:D stack:28976 pid:19944 ppid: 6899 flags:0x00000004 [ 1090.438490][ T27] Call Trace: [ 1090.441774][ T27] [ 1090.444714][ T27] __schedule+0xa9a/0x4940 [ 1090.449297][ T27] ? io_schedule_timeout+0x140/0x140 [ 1090.454597][ T27] ? mark_held_locks+0x9f/0xe0 [ 1090.459453][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 1090.464412][ T27] schedule+0xd2/0x260 [ 1090.468546][ T27] rwsem_down_write_slowpath+0x7b9/0x11d0 [ 1090.474287][ T27] ? rwsem_mark_wake+0x830/0x830 [ 1090.479283][ T27] ? lock_release+0x720/0x720 [ 1090.483973][ T27] ? __mutex_unlock_slowpath+0x157/0x5e0 [ 1090.489687][ T27] down_write+0x135/0x150 [ 1090.494119][ T27] ? down_write_killable_nested+0x180/0x180 [ 1090.500148][ T27] ? lockdep_init_map_type+0x2c3/0x7b0 [ 1090.505625][ T27] prealloc_shrinker+0x13d/0x7c0 [ 1090.510688][ T27] ? __raw_spin_lock_init+0x36/0x110 [ 1090.516493][ T27] alloc_super+0x84c/0xac0 [ 1090.520933][ T27] sget_fc+0x13e/0x7c0 [ 1090.525015][ T27] ? kill_litter_super+0xa0/0xa0 [ 1090.530199][ T27] ? bpf_mkprog+0x40/0x40 [ 1090.534621][ T27] get_tree_nodev+0x24/0x1d0 [ 1090.539278][ T27] vfs_get_tree+0x89/0x2f0 [ 1090.543709][ T27] path_mount+0x1320/0x1fa0 [ 1090.548301][ T27] ? finish_automount+0xaf0/0xaf0 [ 1090.553345][ T27] ? putname+0xfe/0x140 [ 1090.557612][ T27] __x64_sys_mount+0x27f/0x300 [ 1090.562385][ T27] ? copy_mnt_ns+0xae0/0xae0 [ 1090.567029][ T27] ? syscall_enter_from_user_mode+0x21/0x70 [ 1090.572952][ T27] do_syscall_64+0x35/0xb0 [ 1090.577425][ T27] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1090.583338][ T27] RIP: 0033:0x7f055dcd8a39 [ 1090.587824][ T27] RSP: 002b:00007f055b1eb188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1090.596284][ T27] RAX: ffffffffffffffda RBX: 00007f055dddc1a0 RCX: 00007f055dcd8a39 [ 1090.604262][ T27] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000000000000 [ 1090.612279][ T27] RBP: 00007f055dd32c5f R08: 0000000020000440 R09: 0000000000000000 [ 1090.620305][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1090.628328][ T27] R13: 00007ffd572e773f R14: 00007f055b1eb300 R15: 0000000000022000 [ 1090.636387][ T27] [ 1090.639416][ T27] INFO: task syz-executor.5:19944 blocked for more than 143 seconds. [ 1090.647540][ T27] Not tainted 5.15.0-rc5-next-20211013-syzkaller #0 [ 1090.654650][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1090.663358][ T27] task:syz-executor.5 state:D stack:28976 pid:19944 ppid: 6899 flags:0x00000004 [ 1090.672658][ T27] Call Trace: [ 1090.676064][ T27] [ 1090.679008][ T27] __schedule+0xa9a/0x4940 [ 1090.683505][ T27] ? io_schedule_timeout+0x140/0x140 [ 1090.688880][ T27] ? mark_held_locks+0x9f/0xe0 [ 1090.693661][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 1090.698702][ T27] schedule+0xd2/0x260 [ 1090.702795][ T27] rwsem_down_write_slowpath+0x7b9/0x11d0 [ 1090.708594][ T27] ? rwsem_mark_wake+0x830/0x830 [ 1090.713545][ T27] ? lock_release+0x720/0x720 [ 1090.718306][ T27] ? __mutex_unlock_slowpath+0x157/0x5e0 [ 1090.723975][ T27] down_write+0x135/0x150 [ 1090.728364][ T27] ? down_write_killable_nested+0x180/0x180 [ 1090.734276][ T27] ? lockdep_init_map_type+0x2c3/0x7b0 [ 1090.739797][ T27] prealloc_shrinker+0x13d/0x7c0 [ 1090.744757][ T27] ? __raw_spin_lock_init+0x36/0x110 [ 1090.750115][ T27] alloc_super+0x84c/0xac0 [ 1090.754555][ T27] sget_fc+0x13e/0x7c0 [ 1090.758682][ T27] ? kill_litter_super+0xa0/0xa0 [ 1090.763639][ T27] ? bpf_mkprog+0x40/0x40 [ 1090.768051][ T27] get_tree_nodev+0x24/0x1d0 [ 1090.772662][ T27] vfs_get_tree+0x89/0x2f0 [ 1090.777134][ T27] path_mount+0x1320/0x1fa0 [ 1090.781750][ T27] ? finish_automount+0xaf0/0xaf0 [ 1090.786855][ T27] ? putname+0xfe/0x140 [ 1090.791032][ T27] __x64_sys_mount+0x27f/0x300 [ 1090.795855][ T27] ? copy_mnt_ns+0xae0/0xae0 [ 1090.800460][ T27] ? syscall_enter_from_user_mode+0x21/0x70 [ 1090.806418][ T27] do_syscall_64+0x35/0xb0 [ 1090.810848][ T27] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1090.816811][ T27] RIP: 0033:0x7f055dcd8a39 [ 1090.821236][ T27] RSP: 002b:00007f055b1eb188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1090.829698][ T27] RAX: ffffffffffffffda RBX: 00007f055dddc1a0 RCX: 00007f055dcd8a39 [ 1090.837806][ T27] RDX: 0000000020000140 RSI: 0000000020000080 RDI: 0000000000000000 [ 1090.845832][ T27] RBP: 00007f055dd32c5f R08: 0000000020000440 R09: 0000000000000000 [ 1090.853815][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1090.861871][ T27] R13: 00007ffd572e773f R14: 00007f055b1eb300 R15: 0000000000022000 [ 1090.870005][ T27] [ 1097.148642][ T27] [ 1097.148642][ T27] Showing all locks held in the system: [ 1097.156884][ T27] 1 lock held by khungtaskd/27: [ 1097.161739][ T27] #0: ffffffff8bb82ea0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 [ 1097.172289][ T27] 3 locks held by khugepaged/33: [ 1097.177472][ T27] 1 lock held by in:imklog/6235: [ 1097.182518][ T27] 3 locks held by syz-executor.3/19072: [ 1097.188136][ T27] 2 locks held by syz-executor.5/19944: [ 1097.193682][ T27] #0: ffff88808f5f60e0 (&type->s_umount_key#70/1){+.+.}-{3:3}, at: alloc_super+0x1dd/0xac0 [ 1097.203896][ T27] #1: ffffffff8bc6c2f0 (shrinker_rwsem){++++}-{3:3}, at: prealloc_shrinker+0x13d/0x7c0 [ 1097.213736][ T27] [ 1097.216108][ T27] ============================================= [ 1097.216108][ T27] [ 1097.224513][ T27] NMI backtrace for cpu 1 [ 1097.228833][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.15.0-rc5-next-20211013-syzkaller #0 [ 1097.238208][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.248264][ T27] Call Trace: [ 1097.251544][ T27] [ 1097.254487][ T27] dump_stack_lvl+0xcd/0x134 [ 1097.259094][ T27] nmi_cpu_backtrace.cold+0x47/0x144 [ 1097.264401][ T27] ? lapic_can_unplug_cpu+0x80/0x80 [ 1097.269621][ T27] nmi_trigger_cpumask_backtrace+0x1ae/0x220 [ 1097.275715][ T27] watchdog+0xcb7/0xed0 [ 1097.279893][ T27] ? trace_sched_process_hang+0x280/0x280 [ 1097.285627][ T27] kthread+0x405/0x4f0 [ 1097.289777][ T27] ? set_kthread_struct+0x130/0x130 [ 1097.294992][ T27] ret_from_fork+0x1f/0x30 [ 1097.299428][ T27] [ 1097.302501][ T27] Sending NMI from CPU 1 to CPUs 0: [ 1097.307744][ C0] NMI backtrace for cpu 0 [ 1097.307754][ C0] CPU: 0 PID: 6525 Comm: syz-fuzzer Not tainted 5.15.0-rc5-next-20211013-syzkaller #0 [ 1097.307775][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.307785][ C0] RIP: 0010:__lock_acquire+0x4c7/0x54a0 [ 1097.307810][ C0] Code: 0f 84 af 02 00 00 49 8d 7c 24 21 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 <84> c0 0f 85 dc 38 00 00 41 0f b6 54 24 21 84 d2 0f 88 c2 0b 00 00 [ 1097.307828][ C0] RSP: 0018:ffffc90001a4f8a0 EFLAGS: 00000097 [ 1097.307844][ C0] RAX: 0000000000000000 RBX: ffffffff8bb82ea0 RCX: ffffffff815c292c [ 1097.307857][ C0] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff88801746c4b1 [ 1097.307869][ C0] RBP: ffffffff8ff44c20 R08: 0000000000000000 R09: ffffffff8ff42a07 [ 1097.307882][ C0] R10: fffffbfff1fe8540 R11: 0000000000000000 R12: ffff88801746c490 [ 1097.307894][ C0] R13: ffff88801746ba00 R14: 0000000000020000 R15: 0000000000000002 [ 1097.307907][ C0] FS: 000000c00002e090(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 1097.307923][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1097.307936][ C0] CR2: 000000c004abf900 CR3: 000000001d11c000 CR4: 00000000003506f0 [ 1097.307949][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1097.307967][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1097.307979][ C0] Call Trace: [ 1097.307983][ C0] [ 1097.307994][ C0] ? mark_lock+0xef/0x17b0 [ 1097.308015][ C0] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 1097.308042][ C0] lock_acquire+0x1ab/0x510 [ 1097.308062][ C0] ? select_task_rq_fair+0x277/0x3b50 [ 1097.308151][ C0] ? lock_release+0x720/0x720 [ 1097.308171][ C0] ? __free_object+0x64b/0xe00 [ 1097.308199][ C0] select_task_rq_fair+0x29c/0x3b50 [ 1097.308221][ C0] ? select_task_rq_fair+0x277/0x3b50 [ 1097.308243][ C0] ? do_raw_spin_lock+0x120/0x2b0 [ 1097.308272][ C0] try_to_wake_up+0x38b/0x15a0 [ 1097.308296][ C0] ? sched_core_balance+0xa30/0xa30 [ 1097.308317][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 1097.308337][ C0] ? plist_del+0x24f/0x480 [ 1097.308363][ C0] wake_up_q+0x7e/0xf0 [ 1097.308382][ C0] ? do_raw_spin_unlock+0x171/0x230 [ 1097.308422][ C0] futex_wake+0x3e9/0x490 [ 1097.308443][ C0] ? futex_wake_mark+0x1a0/0x1a0 [ 1097.308464][ C0] ? perf_trace_lock+0xeb/0x4d0 [ 1097.308488][ C0] do_futex+0x25b/0x390 [ 1097.308513][ C0] ? __ia32_sys_get_robust_list+0x420/0x420 [ 1097.308537][ C0] ? find_held_lock+0x2d/0x110 [ 1097.308561][ C0] __x64_sys_futex+0x1b0/0x4a0 [ 1097.308587][ C0] ? do_futex+0x390/0x390 [ 1097.308612][ C0] ? syscall_enter_from_user_mode+0x21/0x70 [ 1097.308640][ C0] do_syscall_64+0x35/0xb0 [ 1097.308659][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1097.308684][ C0] RIP: 0033:0x46e203 [ 1097.308699][ C0] Code: 24 20 c3 cc cc cc cc 48 8b 7c 24 08 8b 74 24 10 8b 54 24 14 4c 8b 54 24 18 4c 8b 44 24 20 44 8b 4c 24 28 b8 ca 00 00 00 0f 05 <89> 44 24 30 c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc [ 1097.308715][ C0] RSP: 002b:000000c00003de70 EFLAGS: 00000206 ORIG_RAX: 00000000000000ca [ 1097.308733][ C0] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 000000000046e203 [ 1097.308745][ C0] RDX: 0000000000000001 RSI: 0000000000000081 RDI: 000000c00002e548 [ 1097.308757][ C0] RBP: 000000c00003dec0 R08: 0000000000000000 R09: 0000000000000000 [ 1097.308769][ C0] R10: 0000000000000000 R11: 0000000000000206 R12: 000000000043b6e0 [ 1097.308780][ C0] R13: 0000000000000000 R14: 0000000000c53c48 R15: 0000000000000000 [ 1097.308799][ C0] [ 1097.309740][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 1097.659329][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.15.0-rc5-next-20211013-syzkaller #0 [ 1097.668705][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.678769][ T27] Call Trace: [ 1097.682053][ T27] [ 1097.684984][ T27] dump_stack_lvl+0xcd/0x134 [ 1097.689591][ T27] panic+0x2b0/0x6dd [ 1097.693494][ T27] ? __warn_printk+0xf3/0xf3 [ 1097.698098][ T27] ? lapic_can_unplug_cpu+0x80/0x80 [ 1097.703313][ T27] ? _flat_send_IPI_mask+0x53/0x60 [ 1097.708446][ T27] ? watchdog.cold+0x1b9/0x1de [ 1097.713232][ T27] watchdog.cold+0x1ca/0x1de [ 1097.717840][ T27] ? trace_sched_process_hang+0x280/0x280 [ 1097.723598][ T27] kthread+0x405/0x4f0 [ 1097.727680][ T27] ? set_kthread_struct+0x130/0x130 [ 1097.732900][ T27] ret_from_fork+0x1f/0x30 [ 1097.737349][ T27] [ 1097.740862][ T27] Kernel Offset: disabled [ 1097.745186][ T27] Rebooting in 86400 seconds..