protocol 88fb is buggy, dev hsr_slave_0 [ 1338.056787][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet6(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000018007fa500fe01b2a4a280930a06000000a84306910000003900090035000c00000000001900150006000000000000dc1338d54400009b84136ef75afb83de4411007227c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 03:43:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xfeffffff}], 0x1, 0x6) 03:43:07 executing program 1: socketpair(0x5, 0x80000, 0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @rand_addr=0x3}}}, &(0x7f0000000180)=0x84) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000001c0)={r1, 0xfffffffffffffffb, 0x36b}, 0x8) r2 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)={@dev={0xac, 0x14, 0x14, 0x18}, @local, 0x1, 0x5, [@dev={0xac, 0x14, 0x14, 0xa}, @multicast1, @dev={0xac, 0x14, 0x14, 0x12}, @rand_addr=0x2, @empty]}, 0x24) 03:43:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)={0x8f, 0x0, [0xfe]}) 03:43:07 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020a040007000000ebff04df333f220005001a00100f000000000000005f003ad19bb1575ce5cac4c618287bee5e000000000000000010fe"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0xc46, 0x0) 03:43:07 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x5, 0x0, 0x80000000, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)={0x8f}) 03:43:07 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@default, @default={0x98, 0x92, 0x9c, 0xaa, 0xb0, 0x40, 0x6}, 0x0, [@netrom, @rose, @null, @remote, @netrom, @rose, @netrom, @bcast]}) 03:43:07 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000000)={0x0, {0x7, 0x400}}) 03:43:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xffffff7f}], 0x1, 0x6) 03:43:07 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890b, &(0x7f0000000080)={@default, @default, 0x0, [@netrom, @rose, @null, @remote, @netrom, @rose, @netrom, @bcast]}) [ 1338.432961][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1338.438801][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:43:07 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) connect$ax25(r0, &(0x7f0000000100)={{0x3, @default, 0x1}, [@netrom, @bcast, @bcast, @default, @remote, @bcast, @bcast]}, 0x48) 03:43:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)={0x8f}) 03:43:07 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x5, 0x0, 0x80000000, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:08 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80084502, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "f06f8900c4a1829275665e540dac2b42336bafbdd6d7560f3e1a00bd410f6511"}) [ 1338.595988][T19570] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 03:43:08 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x1, 0x140) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x4) r1 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x23ae4eb1, 0x7, 0x80, 0xc2d}, {0x7, 0x7e72436c, 0x4, 0x6}]}) 03:43:08 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) connect$ax25(r0, &(0x7f0000000100)={{0x3, @default, 0x1}, [@netrom, @bcast, @bcast, @default, @remote, @bcast, @bcast]}, 0x48) 03:43:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xfffffffc}], 0x1, 0x6) 03:43:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)={0x8f}) [ 1338.796155][T19698] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 03:43:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:08 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_PROFILE(r0, 0xc0044306, &(0x7f0000000000)) 03:43:08 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000000)=""/62) 03:43:08 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x5, 0x0, 0x80000000, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:08 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x100, 0x0) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x3) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) connect$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x3, {0xffffffff, 0xffffffffffffff00, 0x5, 0x1, 0x9, 0xffffffffffffa688}, 0x721, 0x5}, 0xe) 03:43:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xfffffffe}], 0x1, 0x6) 03:43:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 03:43:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x6}) 03:43:08 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0xfffffffffffffff5, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xf6cd, 0x4, &(0x7f0000000240)=[{&(0x7f0000000080), 0x0, 0x100}, {&(0x7f00000000c0)="8cea9dd26d38be80900e6347dcc1449d81f52a96004ab4b8a403a6c348dbabf5fa0c687d29eef58f800681cc53e455dc31a249d89a01ed35b749577ed7e81107109743ae60bd1ac8b326c40a6f74be4e57ac848420a6d7616c95367d031257e4b7e5cb4b1e4509a97e89ae4898e4ee1f2f926c93fffa483cf7", 0x79, 0x3}, {&(0x7f0000000140)="38ff9d0553fd6008ff86e40928cda2aef7708e1a6ab851c8b9f3ec6b23952de2a2012112a45226327473cbfd2a3e35f3f8321a3fcfabeeb64529b67b0da6cc2eaaff469f9504a8427f669771c0d6d4a595db6c56e9e0c42a17e21a5bc3fadaba446d60fc26fe1ef46c097b900211b25dabea625d1c3b50dcd91cf2d7079c969fc85cf47cd6059a897170dff763b457521fe45c2488", 0x95, 0x1}, {&(0x7f0000000200), 0x0, 0xb187}], 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='dioread_lock,block_validity,permit_directio,fsuuid=65}8fab\x00-49fb-4w\x00c-f6a3-yewaw27d,rootcontext=system_u,smackfsroot=/dev/video#\x00,uid>', @ANYRESDEC=0x0, @ANYBLOB="2c7065726d69745f646972656374696f2c686173682c00a10c1b6801953c6e2cf8f741c64497f008a06c7e0000000000000000000000"]) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000340)={0x0, 0x0, {0x1000, 0x1, 0x3003, 0x0, 0x7, 0x4, 0x2, 0x2}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x8, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f00000004c0)={{0x0, 0x3, 0x9, 0x1, 0x5}, 0x50e, 0x7, 0xffffffffffffffff}) 03:43:08 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x100000000000}], 0x1, 0x6) 03:43:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0xc0000103}]}) [ 1339.374072][T20133] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 03:43:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:09 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCSABS0(r1, 0x401845c0, 0x0) 03:43:09 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) r1 = syz_open_dev$audion(&(0x7f00000005c0)='/dev/audio#\x00', 0x9, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000400)={0xfffffffffffffffc, 0x1f, 0x5, {0xa, @pix={0x3, 0x81, 0x41495043, 0x2, 0x7fff, 0x9, 0x7, 0x9, 0x1, 0x3, 0x2, 0x5}}}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x8600, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x3, 0x0, 0x0, 0xd}) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000000)={0x1, 0x10001}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000080)={0x100, r3}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) getsockopt$inet6_tcp_int(r0, 0x6, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0x4) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$sndseq(r2, &(0x7f00000001c0)=[{0x400, 0x3, 0x100, 0x7fffffff, @time={r4, r5+10000000}, {0xffffffffffffe298, 0x4}, {0x7, 0xffffffff}, @raw8={"c862ff238991b33613437374"}}, {0x0, 0x0, 0x100000000, 0x3ff000000000, @tick=0x7ff, {0x7, 0x5}, {0x4, 0xfffffffffffffffb}, @quote={{0x6, 0x2}, 0x20, &(0x7f0000000140)={0x7fffffff, 0xbb, 0x1800, 0x3, @time, {0x8, 0xea}, {0x1, 0x3}, @queue={0x6, {0x1, 0xb5e2}}}}}, {0x1, 0x3, 0x8, 0x80000001, @time={0x77359400}, {0x6, 0x4}, {0x7ff, 0x8}, @quote={{0x1}, 0x9}}, {0x9, 0x910e, 0x9b95, 0x0, @time, {0x6, 0x3ffc000000}, {0x2, 0x6}, @result={0x9, 0x7}}, {0x9, 0x7ff, 0x5, 0x7, @tick=0xffffffffffffffff, {0x1, 0x100}, {0x8, 0x8}, @raw32={[0x3f, 0x2, 0x8]}}, {0xffff, 0x0, 0x1, 0x9, @time={0x77359400}, {0x6, 0x4}, {0x5f}, @addr={0x10000, 0x80000001}}, {0x7, 0x3, 0x400, 0x1, @time={r6, r7+30000000}, {0xffffffffffffff81, 0x101}, {0x3, 0x400}, @control={0x100000000000, 0x5, 0xffffffffffffffe1}}], 0x150) setsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000380)=0x4, 0x4) 03:43:09 executing program 4: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb, 0x4}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0x0, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x5, 0x0, 0x80000000, 0xfffffffffffffc01, 0x3, 0x8, 0x55b, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff, 0x2], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x0, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x0, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x0, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) socket$vsock_stream(0x28, 0x1, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0xfffffffffffffef6) 03:43:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x200000000000}], 0x1, 0x6) 03:43:09 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:09 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCSABS0(r1, 0x401845c0, 0x0) 03:43:09 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x80, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x5, 0x4, 0x1, 0x80000, r1}) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f00000000c0)=""/82) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/1) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) 03:43:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xd00700000000}], 0x1, 0x6) 03:43:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) [ 1340.192090][T20589] FS-Cache: Duplicate cookie detected [ 1340.197790][T20589] FS-Cache: O-cookie c=0000000020ae8275 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1340.206731][T20589] FS-Cache: O-cookie d=000000000df64cd0 n=0000000089325c6f [ 1340.214044][T20589] FS-Cache: O-key=[10] '0200020000807f000008' [ 1340.220183][T20589] FS-Cache: N-cookie c=00000000ed372ab1 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1340.228994][T20589] FS-Cache: N-cookie d=000000000df64cd0 n=00000000e4e859a8 [ 1340.236259][T20589] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:09 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:09 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCSABS0(r1, 0x401845c0, 0x0) 03:43:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:10 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xd53c, 0x208001) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, {0xa, 0x4e20, 0x401, @remote, 0x6f1}, 0x1, [0x1, 0xfffffffffffffff8, 0xfff, 0x7fffffff, 0x3, 0x8001, 0x1, 0x7ff]}, 0x5c) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000140)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, 0x4000}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x80000, 0x0) pipe2$9p(&(0x7f0000000180), 0x4000) 03:43:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x10000000000000}], 0x1, 0x6) 03:43:10 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCSABS0(r1, 0x401845c0, 0x0) 03:43:10 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:10 executing program 5: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) 03:43:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x40000000000000}], 0x1, 0x6) 03:43:10 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8, 0xfffffffff7fffffd) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) r1 = semget$private(0x0, 0x7, 0x400) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000040)=""/76) semctl$SEM_INFO(r1, 0x0, 0x13, &(0x7f00000000c0)=""/131) 03:43:10 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:10 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x26442) 03:43:10 executing program 5: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) 03:43:10 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000000)={0x7, 0x11803, "7caa1418058df01d9ddf4bc9225d18d076697c4a0c315128", {0x100000000, 0xc74}, 0x40001ff}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) 03:43:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x8000a0ffffffff}], 0x1, 0x6) 03:43:11 executing program 5: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) 03:43:11 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:11 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x400000000000, 0x1e, 0x3, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) 03:43:11 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x26442) 03:43:11 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x26442) 03:43:11 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 03:43:11 executing program 1: syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x8, 0x28f8, 0x40, 0x7fffffff, 0x200, 0xfffffffffffffffb, 0xf105, {0x0, @in6={{0xa, 0x4e23, 0x6, @mcast1, 0xfffffffffffeffff}}, 0xbc, 0x0, 0x100000000, 0x10001, 0x7}}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={r1, 0x8}, &(0x7f0000000240)=0x8) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x80, @bcast, @bpq0='bpq0\x00', 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r2, 0x3}, &(0x7f0000000100)=0x8) 03:43:11 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:11 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x26442) 03:43:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x800c0000000000}], 0x1, 0x6) 03:43:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:11 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 03:43:11 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) r1 = socket(0x19, 0x80000, 0xfffffffffffff801) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0x4) eventfd(0x43) timer_create(0x2, &(0x7f0000000140)={0x0, 0x30, 0x0, @thr={&(0x7f0000000940)="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", &(0x7f0000000080)="5a64c7aebfb2079d5e59a21e5ed759141ad3068c010aa2c3b4215a4cfb1621be1e2c4a9d56c6feb536dd49f5999f4516ef4a755561b48750ba2b4dfaf6a86b19d6879ca09a6c58fa3f92fd6a74469e7f9ec691ae10fc7dc7c0cb1221446ef56e1a976188014d5425d7c0afeb06ca4296ec5333999e08e448eb9eb2970399721d691935c86259107c8351f688bd930af3a7e883e08b2db6f4e8ac3e94e812ca3d963e8f1f2c01bcc8c4d46cc8b0dcdaf88e4aef65aed8257d62"}}, &(0x7f0000000180)=0x0) timer_gettime(r2, &(0x7f00000001c0)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000200)={0x0, 0x1f, 0x44, {0x2, @sliced={0x10001, [0xd5, 0xf14, 0x4, 0x0, 0x6, 0x7, 0x6, 0x8, 0x9, 0x3b, 0x8, 0x9, 0x6, 0xffffffffffffffe0, 0x3, 0xffffffff, 0x1, 0x0, 0x8, 0x3, 0x1, 0x5, 0x6, 0x81, 0x5, 0x5143, 0x7, 0x31e4, 0xfffffffffffffff7, 0x2d, 0x51, 0x9, 0x4, 0x6, 0x1ff, 0xffffffffffffffc6, 0x8, 0x2, 0x2b, 0x2a7f, 0x8, 0x80, 0xb68, 0x0, 0x1f, 0x9, 0x8, 0x8001], 0x5e15}}}) fstat(r0, &(0x7f0000000000)) 03:43:11 executing program 4: syz_open_dev$evdev(0x0, 0x0, 0x26442) 03:43:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xd0070000000000}], 0x1, 0x6) 03:43:11 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1342.592957][ C1] net_ratelimit: 22 callbacks suppressed [ 1342.592995][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1342.604523][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:43:12 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 03:43:12 executing program 4: syz_open_dev$evdev(0x0, 0x0, 0x26442) 03:43:12 executing program 5: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCSABS0(r1, 0x401845c0, 0x0) 03:43:12 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:12 executing program 4: syz_open_dev$evdev(0x0, 0x0, 0x26442) 03:43:12 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0xe5ff, 0x10000) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) [ 1342.912943][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1342.918793][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:43:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x100000000000000}], 0x1, 0x6) 03:43:12 executing program 5: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCSABS0(r1, 0x401845c0, 0x0) 03:43:12 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) 03:43:12 executing program 1: syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x5, 0x105801) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x80000000, 0x662b7ae55562755f) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x28, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r1, 0x9, 0x8}, 0xc) r3 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) write$binfmt_elf64(r2, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x400, 0x3, 0x0, 0x100000000, 0x6573, 0x3, 0x3f, 0x2f, 0x59, 0x40, 0x34, 0x1000, 0x5, 0x38, 0x1, 0x0, 0x2, 0x9}, [{0x2, 0x0, 0xfff, 0x5, 0xac8c, 0x7, 0x1, 0x9}], "472d745299622310248606b49a1c617e373b3678f511db1ddf3bf4171737d235f43a8a679c4e727b2ad52311ed0fabb95b40b47e421695b938ab1df6b832d7860589fc3f91b66732899d19d9934f5c99c9d6dbe439ad6dfbb46daa9229fe4b98885278145ba1d802351cf21a3d181312a925112c56e927a7f10050e8257e85c22d4c81d416c64f20fcc95894924ea7815fa25e5712f444be72c098a96cf23378eac34f5d6ce6a0fac60b3733cf79d51b8bb0cbace563f7adf08a8b9001aaf02185f995a41bd28d2401bb3493b523c1c49df91bcfdb40", [[], [], [], []]}, 0x54e) 03:43:12 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:12 executing program 5: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCSABS0(r1, 0x401845c0, 0x0) 03:43:12 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) 03:43:13 executing program 5: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 03:43:13 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1343.632960][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1343.638841][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:13 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x2}) r1 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) 03:43:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x200000000000000}], 0x1, 0x6) [ 1344.273019][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1344.278874][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1344.284788][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1344.290570][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:13 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) 03:43:13 executing program 5: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 03:43:13 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x35, "fa01b427b37473f0e06578ee7ea16650b812e55899c4090a7d24e192ade516ea4050522a89787b42b70142146c09280d3679569c47"}, &(0x7f0000000040)=0x3d) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={r1, 0x9}, &(0x7f00000000c0)=0x8) 03:43:13 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x300000000000000}], 0x1, 0x6) 03:43:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) 03:43:13 executing program 5: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 03:43:13 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000540)) 03:43:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x400000000000000}], 0x1, 0x6) 03:43:14 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x0, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) 03:43:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:14 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) dup(r0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) 03:43:14 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x56d901, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100)={0xffffffffffffffc1, 0x4, 0x9, 0x4, 0xffff, 0x72480fff, 0x4, 0x1, 0x80, 0x2, 0x6e08}, 0xb) write$P9_RFSYNC(r1, &(0x7f00000001c0)={0x7, 0x33, 0x2}, 0x7) r2 = accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x80800) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000140)=""/95) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) 03:43:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x500000000000000}], 0x1, 0x6) 03:43:14 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0x1f, 0x0, 0x0}) 03:43:14 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x0, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:14 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) dup(r0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) 03:43:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:14 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0x1f, 0x0, 0x0}) 03:43:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x600000000000000}], 0x1, 0x6) 03:43:14 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000000)={0x6, @sliced={0x6, [0x2, 0xed, 0x8e24, 0x7f, 0x8, 0x7ff, 0x80, 0x80000001, 0x2, 0xfffffffffffffff8, 0x4, 0x8, 0x7ff, 0xfffffffffffffffc, 0x8000, 0x200, 0x2, 0x20, 0x3, 0x7, 0x8001, 0x68, 0x5, 0x8000, 0xf8d3, 0x1, 0x83, 0x1, 0xffff, 0x7f, 0x6, 0x3, 0x447, 0x9, 0x400, 0x6, 0xb6e8, 0x20, 0x7, 0x41, 0x200, 0x3, 0x9, 0x1, 0x4, 0x1, 0x9, 0x2], 0x8}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x400081, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000140)=0x0) syz_open_procfs(r2, &(0x7f0000000180)='net/ip_vs\x00') ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000200)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) 03:43:14 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) dup(r0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) 03:43:15 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x0, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:15 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0x1f, 0x0, 0x0}) 03:43:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:15 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000003c0)="eacba87a0e665072a0785de926e293970f22a78fb71509801083bfb183f7", 0x1e) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) ioctl$FIONREAD(r2, 0x541b, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x5, 0x2, 0x1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000500)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = syz_open_dev$video(&(0x7f0000000480)='/dev/video#\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000540)={0xc4e}, 0x8) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x400000085, 0x0, 0x0, 0x0, 0xffffffffbf800000) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000300)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) 03:43:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x700000000000000}], 0x1, 0x6) 03:43:15 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0x1f, 0x0, 0x0}) 03:43:15 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) 03:43:15 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0x0, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1345.998326][T23329] futex_atomic_op_inuser: 2 callbacks suppressed [ 1345.998361][T23329] futex_wake_op: syz-executor.5 tries to shift op by -2048; fix this program 03:43:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:15 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$SIOCAX25OPTRT(r0, 0x89e7, 0x0) 03:43:15 executing program 4: ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000080)={0x1f, 0x0, 0x0}) 03:43:15 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x3, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) ioctl(r0, 0x4, &(0x7f0000000000)="2f706a714a8aa62ccc53c548449e0028ec2aabebc58dd9fe53d2bd32849695a8db4195ccf5b5b8ad31b49898a75ffad942c4082899a072153251454f48ae8dfbd97b4ca44032a9b57db5d5ed9f46cd3f9bb373ed981466eb") 03:43:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x800000000000000}], 0x1, 0x6) 03:43:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:15 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0x0, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:15 executing program 4: ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000080)={0x1f, 0x0, 0x0}) 03:43:15 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18}, 0x18) 03:43:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:15 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0xfffffffffffffffc) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) 03:43:15 executing program 4: ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000080)={0x1f, 0x0, 0x0}) 03:43:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xa00000000000000}], 0x1, 0x6) 03:43:16 executing program 5: open(&(0x7f0000000480)='./file0\x00', 0x40, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x0, 0x0) 03:43:16 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x2, 0x0) r1 = socket(0x0, 0x80e, 0x3f) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r2, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x163}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc000}, 0x10) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) 03:43:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:16 executing program 4: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0x1f, 0x0, 0x0}) 03:43:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) 03:43:16 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0x0, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xb00000000000000}], 0x1, 0x6) 03:43:16 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @win={{0x7, 0x0, 0x4, 0x401}, 0x9, 0xb72, &(0x7f0000000100)={{0x1ef, 0x4, 0x1, 0x2}, &(0x7f00000000c0)={{0x3, 0x8, 0x1, 0x6}, &(0x7f0000000080)={{0x0, 0x1, 0x3, 0x7f2}}}}, 0xffffffffffffffc0, &(0x7f0000000140)="96745826cdddfb0876752a980904dd160919e32d51c07353d63ddeca04041c7fe41d0efc9114c5247e24b5dd603cadc1d8d458935c68a4f18236cc42d5c9d2cbfe6f6b07f6e700af80bf36693318", 0x7fffffff}}}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000040)={0x0, 0x7, 0x100000000, {0x9, 0x6}, {0x66, 0x10}, @rumble={0x8001, 0xfff}}) 03:43:16 executing program 4: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0x1f, 0x0, 0x0}) 03:43:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:16 executing program 4: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0x1f, 0x0, 0x0}) 03:43:16 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x7, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) 03:43:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xb00020000000000}], 0x1, 0x6) 03:43:16 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:16 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) [ 1347.792949][ C0] net_ratelimit: 18 callbacks suppressed [ 1347.792955][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1347.804550][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x40000106}]}) 03:43:17 executing program 4: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000080)={0x1f, 0x0, 0x0}) 03:43:17 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x4, 0x4c0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 03:43:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xd00000000000000}], 0x1, 0x6) 03:43:17 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:17 executing program 4: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000080)={0x1f, 0x0, 0x0}) 03:43:17 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000040)={0x80000001, 0x1b040, "644ea6c94d48b9a37895c5fe8b307d374c5d0963e15ecc64", {0x6, 0x7f}, 0x6e7b7fc0}) ioctl$RTC_WIE_ON(r1, 0x700f) 03:43:17 executing program 5: 03:43:17 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:17 executing program 4: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000080)={0x1f, 0x0, 0x0}) 03:43:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xe00000000000000}], 0x1, 0x6) 03:43:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:17 executing program 5: [ 1348.433049][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1348.438909][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1348.444853][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1348.450750][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1348.456731][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1348.462538][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:17 executing program 1: r0 = syz_open_dev$video(&(0x7f00000003c0)='/dev/video#\x00', 0x8, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x17, 0x680400) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000040)=""/48, &(0x7f0000000080)=0x30) 03:43:17 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, 0x0) 03:43:18 executing program 5: 03:43:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xf00000000000000}], 0x1, 0x6) 03:43:18 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:18 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x21e7, 0xffffffffffffffff) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000000c0)={0x4000000000000, 0x1f, 0x4, {0x2, @pix_mp={0x1, 0x7, 0x0, 0x7, 0xa, [{0x7fff, 0x4}, {0x5, 0x1}, {0x10000, 0xcb}, {0x9, 0x7}, {0x4, 0x5}, {0x9, 0x1}, {0x10000}, {0x1, 0x33}], 0x42f, 0x29, 0xf, 0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) keyctl$session_to_parent(0x12) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f00000001c0)=@md5={0x1, "00858b333d828e136e83aa09f0c0942a"}, 0x11, 0x3) 03:43:18 executing program 5: [ 1348.832977][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1348.838833][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:43:18 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, 0x0) 03:43:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x1000000000000000}], 0x1, 0x6) 03:43:18 executing program 5: 03:43:18 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:18 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:18 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, 0x0) 03:43:18 executing program 5: 03:43:18 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000840)={0x0, 0x1f, 0x4, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}) 03:43:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x1100000000000000}], 0x1, 0x6) 03:43:18 executing program 5: 03:43:18 executing program 1: 03:43:18 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0x0, 0x0, 0x0}) 03:43:19 executing program 1: 03:43:19 executing program 5: 03:43:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x2000000000000000}], 0x1, 0x6) 03:43:19 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:19 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:19 executing program 1: 03:43:19 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0x0, 0x0, 0x0}) 03:43:19 executing program 5: 03:43:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x4000000000000000}], 0x1, 0x6) 03:43:19 executing program 5: 03:43:19 executing program 1: 03:43:19 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0x0, 0x0, 0x0}) 03:43:19 executing program 5: 03:43:20 executing program 5: 03:43:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x401f000000000000}], 0x1, 0x6) 03:43:20 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:20 executing program 1: 03:43:20 executing program 5: 03:43:20 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x89ea, &(0x7f0000000080)={@default, @default, 0x0, [@netrom, @rose, @null, @remote, @netrom, @rose, @netrom, @bcast]}) 03:43:20 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0x6400000000000000}], 0x1, 0x6) 03:43:20 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x89e8, &(0x7f0000000080)={@default, @default, 0x0, [@netrom, @rose, @null, @remote, @netrom, @rose, @netrom, @bcast]}) 03:43:20 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000040)={@default, @remote, 0x2, 0x20}) 03:43:20 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) connect$ax25(r0, &(0x7f0000000100)={{0x3, @default}, [@netrom, @bcast, @bcast, @default, @remote, @bcast, @bcast]}, 0x48) 03:43:20 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) bind$ax25(r0, &(0x7f0000000100)={{0x3, @default}, [@remote, @remote, @bcast, @default, @bcast, @bcast, @netrom, @bcast]}, 0x48) 03:43:20 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) [ 1351.474040][T25743] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 03:43:20 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1351.711389][T25800] FS-Cache: Duplicate cookie detected [ 1351.716913][T25800] FS-Cache: O-cookie c=0000000030f024a4 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1351.725904][T25800] FS-Cache: O-cookie d=000000000df64cd0 n=00000000d932265f [ 1351.733282][T25800] FS-Cache: O-key=[10] '0200020000807f000008' [ 1351.733337][T25800] FS-Cache: N-cookie c=00000000e2ad8549 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1351.733347][T25800] FS-Cache: N-cookie d=000000000df64cd0 n=000000005687b799 [ 1351.733354][T25800] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:21 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xa086010000000000}], 0x1, 0x6) 03:43:21 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000040)={@default, @remote, 0x2, 0x20}) 03:43:21 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:21 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:21 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000040)={@default, @remote, 0x2, 0x20}) 03:43:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xf404000000000000}], 0x1, 0x6) 03:43:21 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000040)={@default, @remote, 0x2, 0x20}) 03:43:21 executing program 1: ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f0000000040)={@default, @remote, 0x2, 0x20}) 03:43:21 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:21 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:21 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1352.762605][T26035] FS-Cache: Duplicate cookie detected [ 1352.768169][T26035] FS-Cache: O-cookie c=00000000985ac916 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1352.777338][T26035] FS-Cache: O-cookie d=000000000df64cd0 n=000000007337654a [ 1352.784704][T26035] FS-Cache: O-key=[10] '0200020000807f000008' [ 1352.790853][T26035] FS-Cache: N-cookie c=00000000a4feb043 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1352.799611][T26035] FS-Cache: N-cookie d=000000000df64cd0 n=0000000051dc4ec4 [ 1352.806905][T26035] FS-Cache: N-key=[10] '0200020000807f000008' [ 1352.992950][ C1] net_ratelimit: 22 callbacks suppressed [ 1352.992959][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1353.004460][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:43:22 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xfcffffff00000000}], 0x1, 0x6) 03:43:22 executing program 1: ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f0000000040)={@default, @remote, 0x2, 0x20}) 03:43:22 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:22 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:22 executing program 1: ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f0000000040)={@default, @remote, 0x2, 0x20}) 03:43:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xfeffffff00000000}], 0x1, 0x6) 03:43:22 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000040)={@default, @remote, 0x2, 0x20}) [ 1353.313083][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1353.318901][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:43:22 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0x3, 0x297ef) 03:43:22 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:22 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:22 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000040)={@default, @remote, 0x2, 0x20}) [ 1353.692250][T26278] FS-Cache: Duplicate cookie detected [ 1353.698021][T26278] FS-Cache: O-cookie c=000000008ce70756 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1353.706977][T26278] FS-Cache: O-cookie d=000000000df64cd0 n=00000000f8e8da5a [ 1353.714240][T26278] FS-Cache: O-key=[10] '0200020000807f000008' [ 1353.720360][T26278] FS-Cache: N-cookie c=000000009ea3a255 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1353.720382][T26278] FS-Cache: N-cookie d=000000000df64cd0 n=00000000507f6855 [ 1353.736412][T26278] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:23 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0x3, 0x297ef) 03:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xffffff7f00000000}], 0x1, 0x6) 03:43:23 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000040)={@default, @remote, 0x2, 0x20}) 03:43:23 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:23 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1354.032960][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1354.038920][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:23 executing program 1: syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f0000000040)={@default, @remote, 0x2, 0x20}) 03:43:23 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0x3, 0x297ef) 03:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xffffffff00000000}], 0x1, 0x6) 03:43:23 executing program 1: syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f0000000040)={@default, @remote, 0x2, 0x20}) 03:43:23 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x0, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:23 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:23 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:23 executing program 1: syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f0000000040)={@default, @remote, 0x2, 0x20}) 03:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1, 0x0, 0xffffffffa0008000}], 0x1, 0x6) 03:43:24 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, 0x0) [ 1354.651456][T26521] FS-Cache: Duplicate cookie detected [ 1354.657104][T26521] FS-Cache: O-cookie c=00000000a73c04e3 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1354.666050][T26521] FS-Cache: O-cookie d=000000000df64cd0 n=000000008c5261d6 [ 1354.673436][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1354.673495][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1354.673586][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1354.673631][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1354.696860][T26521] FS-Cache: O-key=[10] '0200020000807f000008' [ 1354.703056][T26521] FS-Cache: N-cookie c=00000000499dcee4 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1354.711743][T26521] FS-Cache: N-cookie d=000000000df64cd0 n=00000000f8827b1d [ 1354.719020][T26521] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:24 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x0, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x2, 0x6) 03:43:24 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:24 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, 0x0) 03:43:24 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, 0x0) 03:43:24 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:24 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:24 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000040)={@default}) 03:43:24 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x0, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x3, 0x6) 03:43:24 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1355.612626][T26815] FS-Cache: Duplicate cookie detected [ 1355.618294][T26815] FS-Cache: O-cookie c=0000000021bab8bf [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1355.627240][T26815] FS-Cache: O-cookie d=000000000df64cd0 n=0000000076c334e7 [ 1355.634527][T26815] FS-Cache: O-key=[10] '0200020000807f000008' [ 1355.640682][T26815] FS-Cache: N-cookie c=00000000fe527db7 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1355.649436][T26815] FS-Cache: N-cookie d=000000000df64cd0 n=0000000023ebdac1 [ 1355.656732][T26815] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:25 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x4, 0x6) 03:43:25 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:25 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x0, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:25 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x5, 0x6) 03:43:25 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:25 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0x3, 0x297ef) 03:43:25 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x0, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x6, 0x6) [ 1356.489499][T27180] FS-Cache: Duplicate cookie detected [ 1356.495289][T27180] FS-Cache: O-cookie c=00000000baad5a0c [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1356.504220][T27180] FS-Cache: O-cookie d=000000000df64cd0 n=000000006833c3e4 [ 1356.511445][T27180] FS-Cache: O-key=[10] '0200020000807f000008' [ 1356.517623][T27180] FS-Cache: N-cookie c=0000000056ca9742 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1356.526372][T27180] FS-Cache: N-cookie d=000000000df64cd0 n=00000000f51aeb96 [ 1356.533657][T27180] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x7, 0x6) 03:43:26 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:26 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x0, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x8, 0x6) 03:43:26 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:26 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0xa, 0x6) 03:43:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:26 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x0, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:26 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:26 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x0, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0xb, 0x6) 03:43:27 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:27 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:27 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:27 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x0, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:27 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0xc, 0x6) 03:43:27 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:27 executing program 1: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1358.192986][ C0] net_ratelimit: 18 callbacks suppressed [ 1358.192996][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1358.204951][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:27 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:27 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0xd, 0x6) 03:43:27 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x0, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:27 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:28 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:28 executing program 1: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0xe, 0x6) 03:43:28 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1358.832958][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1358.838886][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1358.844839][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1358.850641][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1358.856564][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1358.862374][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:28 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:28 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x0, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1359.232954][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1359.238802][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:43:28 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0xf, 0x6) 03:43:28 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:28 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0x0, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:28 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x0, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:29 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:29 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x10, 0x6) 03:43:29 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:29 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:29 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x0, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1360.011516][T28361] FS-Cache: Duplicate cookie detected [ 1360.017107][T28361] FS-Cache: O-cookie c=000000001a77f1ff [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1360.026048][T28361] FS-Cache: O-cookie d=000000000df64cd0 n=00000000ce2ffc4d [ 1360.033308][T28361] FS-Cache: O-key=[10] '0200020000807f000008' [ 1360.039422][T28361] FS-Cache: N-cookie c=0000000020ae8275 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1360.048177][T28361] FS-Cache: N-cookie d=000000000df64cd0 n=00000000be0a4512 [ 1360.055516][T28361] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:29 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x11, 0x6) 03:43:29 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:29 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x0, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:29 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:29 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x12, 0x6) 03:43:29 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:30 executing program 4: mkdir(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x14, 0x6) 03:43:30 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:30 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:30 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:30 executing program 4: mkdir(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:30 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x15, 0x6) 03:43:30 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:30 executing program 4: mkdir(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:30 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:30 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:30 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:30 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x16, 0x6) 03:43:31 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:31 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:31 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:31 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:31 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x17, 0x6) 03:43:31 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:31 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x18, 0x6) 03:43:31 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x19, 0x6) 03:43:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:32 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:32 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:32 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x34, 0x6) 03:43:32 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:32 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:32 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:32 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) [ 1363.392963][ C1] net_ratelimit: 22 callbacks suppressed [ 1363.392971][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1363.404527][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:43:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x35, 0x6) 03:43:32 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) [ 1363.712945][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1363.718825][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:43:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:33 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:33 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:33 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x80000, 0x6) 03:43:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:33 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:33 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0xfffffffe, 0x6) 03:43:33 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) [ 1364.432971][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1364.438851][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:34 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0xffffefffffffff7f, 0x6) 03:43:34 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:34 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0x0, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:34 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) [ 1365.072945][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1365.078898][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1365.084820][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1365.090609][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:34 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:34 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0x0, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 03:43:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:35 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:35 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:35 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0x0, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x4) 03:43:35 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:35 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x5) 03:43:35 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:35 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x0, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:35 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:36 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:36 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x9) 03:43:36 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:36 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x0, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:36 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:36 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:36 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0xb) 03:43:36 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x0, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:36 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:36 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0xd) 03:43:36 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:36 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:36 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:36 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0xe) 03:43:36 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:36 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:37 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:37 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:37 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x12) 03:43:37 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0x0, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:37 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:37 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:37 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x14) 03:43:37 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0x0, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:37 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1368.593010][ C0] net_ratelimit: 18 callbacks suppressed [ 1368.593027][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1368.604593][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:38 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:38 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0x0, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x18) 03:43:38 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1369.232976][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1369.238807][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1369.244671][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1369.250427][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1369.256280][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1369.262063][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b0") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:38 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x35) 03:43:38 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0x3, 0x297ef) 03:43:38 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) [ 1369.491604][T31323] FS-Cache: Duplicate cookie detected [ 1369.497176][T31323] FS-Cache: O-cookie c=00000000f45f2b1c [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1369.506120][T31323] FS-Cache: O-cookie d=000000000df64cd0 n=0000000036c5fd72 [ 1369.513389][T31323] FS-Cache: O-key=[10] '0200020000807f000008' [ 1369.519508][T31323] FS-Cache: N-cookie c=00000000cf2aa28e [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1369.528279][T31323] FS-Cache: N-cookie d=000000000df64cd0 n=00000000949e2189 [ 1369.535562][T31323] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:38 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0x3, 0x297ef) 03:43:39 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1369.632942][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1369.638841][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:43:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b0") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:39 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0x3, 0x297ef) 03:43:39 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x408000, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080), 0x0, 0x6) mq_unlink(&(0x7f0000000080)='\x00') 03:43:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:39 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:39 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:39 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, 0x0, 0x0) 03:43:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) [ 1370.384576][T31568] FS-Cache: Duplicate cookie detected [ 1370.390031][T31568] FS-Cache: O-cookie c=0000000054397d74 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1370.398997][T31568] FS-Cache: O-cookie d=000000000df64cd0 n=00000000f4da6456 [ 1370.399008][T31568] FS-Cache: O-key=[10] '0200020000807f000008' [ 1370.399060][T31568] FS-Cache: N-cookie c=0000000048b2f657 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1370.399070][T31568] FS-Cache: N-cookie d=000000000df64cd0 n=00000000dbd226c6 [ 1370.399076][T31568] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:39 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000100)={0x101, 0x1}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) 03:43:39 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:40 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, 0x0, 0x0) 03:43:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b0") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:40 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x200040) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000100)=@fragment={0x7f, 0x0, 0xd7fe, 0xbfe5, 0x0, 0x6, 0x66}, 0x8) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x0, 0x6) 03:43:40 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, 0x0, 0x0) 03:43:40 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:40 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:40 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) [ 1371.263550][T31805] FS-Cache: Duplicate cookie detected [ 1371.269032][T31805] FS-Cache: O-cookie c=000000008f9b673c [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1371.278050][T31805] FS-Cache: O-cookie d=000000000df64cd0 n=00000000b50ed44e [ 1371.285335][T31805] FS-Cache: O-key=[10] '0200020000807f000008' [ 1371.291461][T31805] FS-Cache: N-cookie c=000000002bcef06a [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1371.300206][T31805] FS-Cache: N-cookie d=000000000df64cd0 n=000000002b77fffa [ 1371.307450][T31805] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1) 03:43:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:40 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x0, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:41 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) 03:43:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x400000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e23, 0x81, @local, 0x3}}, 0x9, 0x3f}, &(0x7f0000000240)=0x90) r4 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f00000000c0)=[{r4}], 0x1, 0x6) 03:43:41 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x0, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:41 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b0") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:41 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) 03:43:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fffffff, 0x200000) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000100)={0xfffffffffffffaa8, 0x8, 0x0, 0x2, 0x10, 0x7f, 0x5fd, 0x7, 0x5567, 0x2, 0x4, 0x4}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) 03:43:41 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x0, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b0") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b0") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:41 executing program 5: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, 0x0, 0x0) 03:43:42 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x4}, 0x28, 0x1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) 03:43:42 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fffffff, 0x200000) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000100)={0xfffffffffffffaa8, 0x8, 0x0, 0x2, 0x10, 0x7f, 0x5fd, 0x7, 0x5567, 0x2, 0x4, 0x4}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) 03:43:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fffffff, 0x200000) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000100)={0xfffffffffffffaa8, 0x8, 0x0, 0x2, 0x10, 0x7f, 0x5fd, 0x7, 0x5567, 0x2, 0x4, 0x4}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) 03:43:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:42 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f2e3c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:43 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fffffff, 0x200000) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000100)={0xfffffffffffffaa8, 0x8, 0x0, 0x2, 0x10, 0x7f, 0x5fd, 0x7, 0x5567, 0x2, 0x4, 0x4}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) 03:43:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) 03:43:43 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) [ 1373.793354][ C1] net_ratelimit: 22 callbacks suppressed [ 1373.793397][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1373.805634][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:43:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fffffff, 0x200000) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000100)={0xfffffffffffffaa8, 0x8, 0x0, 0x2, 0x10, 0x7f, 0x5fd, 0x7, 0x5567, 0x2, 0x4, 0x4}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") poll(&(0x7f0000000080)=[{}], 0x1, 0x6) 03:43:43 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:43 executing program 0: r0 = getpid() setpriority(0x1, r0, 0xb7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x8, &(0x7f0000000180)="0adc1f080d24070db350d261943b790f0000003188b070d9666fcaa662361d38a735136f916c236dff25b9d9f4122cbf69284ca332b462ce93876b1f79abc16f8d1bf5539a7c4fc1753a194d0800000000000000c1280326aeabc6bbf5c2b5837fa5fda1a463c16c607aecf41baa82db0010000000000000b6a0b9e2a197d15f30699cbdb5fe99fa87a54e28dcbe2c3004") r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) [ 1374.112974][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1374.118845][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:43:43 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 03:43:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fffffff, 0x200000) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000100)={0xfffffffffffffaa8, 0x8, 0x0, 0x2, 0x10, 0x7f, 0x5fd, 0x7, 0x5567, 0x2, 0x4, 0x4}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") poll(&(0x7f0000000080)=[{}], 0x1, 0x6) 03:43:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000600)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x6000100}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x14, r2, 0x210, 0x70bd26, 0x25dfdbfb, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x6) write$tun(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="0207030008000600090001ab3c895e1b00178a040bfd2d34465a627b3faeff7ffe4cfbcdec12de8dba8a37364a02d9171bdbe3836dfc741bc3bf64ecbbf3ac6fc3fa990fea061c85406a514c61054b072612e0cee7a3f0ea842bcebad19f02cd90e51b000000000000000000000000"], 0x6f) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f00000000c0)={0x7f, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x0, 'lc\x00', 0x30, 0x51b, 0x65}, 0x2c) 03:43:43 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fffffff, 0x200000) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000100)={0xfffffffffffffaa8, 0x8, 0x0, 0x2, 0x10, 0x7f, 0x5fd, 0x7, 0x5567, 0x2, 0x4, 0x4}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") poll(&(0x7f0000000080)=[{}], 0x1, 0x6) 03:43:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) [ 1374.843421][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1374.849646][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:44 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fffffff, 0x200000) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xfffffffffffffaa8, 0x8, 0x0, 0x2, 0x10, 0x7f, 0x5fd, 0x7, 0x5567, 0x2, 0x4, 0x4}) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x69, 0x40) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) ioctl$KDADDIO(r1, 0x4b34, 0x9) 03:43:44 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 03:43:44 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 03:43:44 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fffffff, 0x200000) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xfffffffffffffaa8, 0x8, 0x0, 0x2, 0x10, 0x7f, 0x5fd, 0x7, 0x5567, 0x2, 0x4, 0x4}) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xfffffffffffffffa, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) socket$inet(0x2, 0x3, 0x401) [ 1375.472997][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1375.478825][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1375.484718][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1375.490501][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 03:43:45 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fffffff, 0x200000) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0xfffffffffffffaa8, 0x8, 0x0, 0x2, 0x10, 0x7f, 0x5fd, 0x7, 0x5567, 0x2, 0x4, 0x4}) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 03:43:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fffffff, 0x200000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:45 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x0, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:45 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 03:43:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1f) r1 = socket$l2tp(0x18, 0x1, 0x1) sendmsg$nl_netfilter(r0, &(0x7f0000001180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001140)={&(0x7f0000000100)={0x1034, 0xe, 0x0, 0x501, 0x70bd2c, 0x25dfdbfb, {0x1, 0x0, 0x1}, [@nested={0x20, 0x95, [@typed={0x4, 0x6a}, @typed={0x8, 0x4f, @fd=r1}, @typed={0x10, 0x16, @str='cgroup@{\x00'}]}, @generic="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"]}, 0x1034}, 0x1, 0x0, 0x0, 0x41}, 0x10) read$alg(r0, &(0x7f00000011c0)=""/171, 0xab) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000012c0)=""/99, &(0x7f0000001340)=0x63) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000001280)=0x1, 0x4) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x6) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000013c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r3, &(0x7f00000015c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000001580)={&(0x7f0000001400)={0x150, r4, 0x220, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xfff, @loopback, 0x8}}}}]}, @TIPC_NLA_LINK={0xf4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1dbf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x40004) 03:43:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:45 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:45 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x0, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:45 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x6) 03:43:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:46 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x0, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:46 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x6) 03:43:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) write$P9_RCREATE(r1, &(0x7f0000000180)={0x18, 0x73, 0x2, {{0x4, 0x4, 0x3}}}, 0x18) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e24, 0x1ff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8000000000000000}, 0x1c) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @sack_perm, @timestamp, @timestamp], 0x4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f00000002c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f0000000300)={{0x6, 0x5, 0x40, 0x2f183b03, 'syz0\x00', 0xfffffffffffffffe}, 0x0, [0xfff, 0x3, 0xfffffffffffffe01, 0x7, 0x7, 0x0, 0x1f, 0x6, 0x9, 0x8, 0x401, 0x1000, 0x10000, 0x7fffffff, 0x4, 0xfff, 0xfff, 0x5, 0x10000, 0xa9, 0x6, 0x4, 0xca0d, 0x200, 0x0, 0xffff, 0x9, 0x400, 0x4, 0xfffffffffffffffc, 0x93f6, 0x0, 0x2, 0x4, 0x401, 0x4, 0x81000000, 0x167, 0x2, 0x7, 0x4, 0x20, 0x373, 0x2, 0x3ff, 0x7fffffff, 0xffffffffffff0c64, 0x0, 0x85, 0x4, 0xadb, 0xfffffffffffffffc, 0x5, 0x400000000, 0xfffffffffffffff8, 0x4, 0x7, 0x2ebddfdf, 0xa8a5, 0x7, 0x8, 0x3ff, 0x101, 0x5d26, 0x4c0, 0x98d, 0x3, 0x3ff, 0x0, 0x3, 0x40, 0x3851, 0x101, 0x3, 0x20, 0x8d9, 0xfff, 0x0, 0x5, 0x2, 0x1f, 0x1, 0x9, 0x9f9, 0x3, 0x7723, 0x7, 0x80, 0xffffffff, 0x9, 0xffffffffffff7fff, 0xffffffff, 0x6, 0x36, 0x9a0, 0x10001, 0x7fffffff, 0x6, 0x5, 0x3, 0x6, 0x3, 0x7, 0x4d277851, 0x3, 0xff, 0xfffffffffffffff7, 0x3, 0x6, 0x13dc000000000, 0x7fff, 0x7, 0xc50, 0x3, 0x0, 0x100000000, 0x1f, 0x8fc, 0x5, 0xe3, 0x1bb0, 0x6, 0x5, 0x0, 0x3ff, 0xffffffffffffffff, 0x4, 0xdb4], {0x77359400}}) unshare(0x10800) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x400140, 0x0) bind$rxrpc(r1, &(0x7f0000000280)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e22, 0x62d4bd74, @loopback, 0x8}}, 0x24) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000200)=""/105) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) 03:43:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:46 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x6) 03:43:46 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x0, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000000c0)={r0}) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:46 executing program 4: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:46 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x6) 03:43:47 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x0, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40, 0x0) write$cgroup_type(r2, &(0x7f0000000100)='threaded\x00', 0x9) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000001c0)={[], 0x8, 0x2, 0x90, 0x7, 0xe2, r3}) ioctl(r1, 0x1000008912, &(0x7f0000000140)="e057dcf1fe1b9c3e8e8a0acc1f123c123f31b08000dc8edd4855507e19c854b51f70a74296c0dc56539c6cec7dea83398b34ea6a3fa6650c3c90f3eb6ec28d2a7783de091f7793f46b54bb6f6c64408ace32df29c53dd92d10e584c132ae20465dbde490dbe9fbc18ad5752783c917deae4b31b65ba0544dfa5cd50edc5cca03") r4 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x100) poll(&(0x7f0000000080)=[{r4}], 0x1, 0x6) 03:43:47 executing program 4: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x0, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x6) 03:43:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:47 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x0, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x6) 03:43:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188f070e1ee459b60c9ee673db92e414bbf2db0b35606b9659d22fc6d06d7a5e5b65d60ed59c2fd7d3250abc2a7f1a831d51b708ab6ca7cfb6dc0f4b9c85e2deeac7598b4d5e4c171116a377b0ee59d1d62") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:47 executing program 4: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:47 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x0, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000100)=[{r1}], 0x3, 0x6) 03:43:47 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x6) 03:43:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:47 executing program 1: write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:48 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x0, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:48 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x6) 03:43:48 executing program 4: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x0, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:48 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x0, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1378.992954][ C0] net_ratelimit: 18 callbacks suppressed [ 1378.992963][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1379.004533][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:48 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x0, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:48 executing program 4: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x0, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = getpid() r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x86000) ioctl$SIOCAX25GETINFO(r2, 0x89ed, &(0x7f00000001c0)) fcntl$setown(r0, 0x8, r1) r3 = syz_open_dev$adsp(&(0x7f0000001bc0)='/dev/adsp#\x00', 0xff, 0x200000) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000001c00)) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x101000, 0x807610d49dfaf0df) sendmsg$nl_generic(r4, &(0x7f0000001b80)={&(0x7f0000000100), 0xc, &(0x7f0000001b40)={&(0x7f0000001c40)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="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"], 0x19e8}, 0x1, 0x0, 0x0, 0x4008000}, 0x20040000) r5 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) poll(&(0x7f0000000080)=[{r5}], 0x1, 0x6) 03:43:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:48 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x0, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:48 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0x0, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1f, &(0x7f0000000040)='2') r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffffff, 0x4000) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:49 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x0, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1379.632960][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1379.638856][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1379.644748][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1379.650551][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1379.656433][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1379.662225][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:49 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x4, 0x4000) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000100)={0x28, 0xffffffffffffffda, 0x4, {{0x4, 0xfef0, 0x1, r1}}}, 0x28) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) 03:43:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:49 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0x0, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:49 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x0, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1380.033446][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1380.039685][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:43:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x101) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) capset(&(0x7f00000000c0)={0x39980732, r5}, &(0x7f0000000100)={0x3, 0xd424, 0x9, 0x80000001, 0x6}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r6 = open(&(0x7f0000000240)='./file0\x00', 0xa42, 0x2) ioctl$KVM_GET_XSAVE(r6, 0x9000aea4, &(0x7f0000000280)) r7 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000200)=[{r2, 0x4000}, {r3, 0x8431}, {r0, 0x1000}, {r0, 0x4}, {r4, 0x402}], 0x5, 0x2) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r7, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x1ff, 0x8}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f00000001c0)={r8, 0x4ba3, 0x30}, 0xc) 03:43:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:49 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x0, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:49 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x0, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) [ 1380.394888][ T2446] FS-Cache: Duplicate cookie detected [ 1380.400360][ T2446] FS-Cache: O-cookie c=00000000fb2c3f4d [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1380.409306][ T2446] FS-Cache: O-cookie d=000000000df64cd0 n=000000005eb91639 [ 1380.416555][ T2446] FS-Cache: O-key=[10] '0200020000807f000008' [ 1380.422672][ T2446] FS-Cache: N-cookie c=000000001a77f1ff [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1380.431424][ T2446] FS-Cache: N-cookie d=000000000df64cd0 n=00000000890c2b50 [ 1380.438679][ T2446] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:49 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x0, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:49 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x0, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:50 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r0, 0x100}], 0x1, 0x806) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0xea, 0x4) 03:43:50 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x0, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:50 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x0, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$RTC_UIE_OFF(r1, 0x7004) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:50 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) [ 1381.260717][ T2904] FS-Cache: Duplicate cookie detected [ 1381.266328][ T2904] FS-Cache: O-cookie c=000000001e4719f5 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1381.275291][ T2904] FS-Cache: O-cookie d=000000000df64cd0 n=00000000debcb062 [ 1381.282494][ T2904] FS-Cache: O-key=[10] '0200020000807f000008' [ 1381.288682][ T2904] FS-Cache: N-cookie c=00000000be5181fb [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1381.297440][ T2904] FS-Cache: N-cookie d=000000000df64cd0 n=0000000047ebf450 [ 1381.304707][ T2904] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x8, 0x20800) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) fadvise64(r1, 0x0, 0xfffffffffffffc01, 0x0) 03:43:50 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:50 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:50 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000001340)='/dev/dmmidi#\x00', 0x5, 0x460080) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000013c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000014c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x100004}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x54, r1, 0x120, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x90) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f00000000c0)=""/4096) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x6) 03:43:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:51 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) 03:43:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) [ 1382.180843][ T3334] FS-Cache: Duplicate cookie detected [ 1382.186396][ T3334] FS-Cache: O-cookie c=000000001f30208a [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1382.195377][ T3334] FS-Cache: O-cookie d=000000000df64cd0 n=000000008bfd4138 [ 1382.202588][ T3334] FS-Cache: O-key=[10] '0200020000807f000008' [ 1382.208807][ T3334] FS-Cache: N-cookie c=00000000a73c04e3 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1382.217562][ T3334] FS-Cache: N-cookie d=000000000df64cd0 n=000000008fc6f1bd [ 1382.224881][ T3334] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x10100, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:51 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x0, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(0x0, 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) [ 1382.422144][ T3553] FS-Cache: Duplicate cookie detected [ 1382.427872][ T3553] FS-Cache: O-cookie c=00000000b18e414b [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1382.436845][ T3553] FS-Cache: O-cookie d=000000000df64cd0 n=00000000e97d67ea [ 1382.444109][ T3553] FS-Cache: O-key=[10] '0200020000807f000008' [ 1382.450238][ T3553] FS-Cache: N-cookie c=0000000056ca9742 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1382.458974][ T3553] FS-Cache: N-cookie d=000000000df64cd0 n=00000000ca9b74f8 [ 1382.466263][ T3553] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e20, 0x80, @mcast2, 0x7}}, [0x4, 0x0, 0x70, 0x80, 0x2a, 0x0, 0xacdd, 0x1, 0x2, 0xc57, 0x8, 0x7ff, 0x2d9, 0x40, 0x41]}, &(0x7f00000002c0)=0x100) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x6b3, 0x80000000, 0xfffffffffffffffe}, 0x8) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x6) 03:43:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(0x0, 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:52 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x0, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(0x0, 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) [ 1383.053899][ T3756] FS-Cache: Duplicate cookie detected [ 1383.059403][ T3756] FS-Cache: O-cookie c=00000000bdfb17c9 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1383.068513][ T3756] FS-Cache: O-cookie d=000000000df64cd0 n=00000000d67fc79f [ 1383.075800][ T3756] FS-Cache: O-key=[10] '0200020000807f000008' [ 1383.082050][ T3756] FS-Cache: N-cookie c=00000000985ac916 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1383.090811][ T3756] FS-Cache: N-cookie d=000000000df64cd0 n=00000000e6eed29a [ 1383.098079][ T3756] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f0000000080)) 03:43:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:52 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x0, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) [ 1383.327330][ T4011] FS-Cache: Duplicate cookie detected [ 1383.332954][ T4011] FS-Cache: O-cookie c=00000000e2ad8549 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1383.341880][ T4011] FS-Cache: O-cookie d=000000000df64cd0 n=00000000710ba3ed [ 1383.349172][ T4011] FS-Cache: O-key=[10] '0200020000807f000008' [ 1383.355366][ T4011] FS-Cache: N-cookie c=00000000bd736e86 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1383.364107][ T4011] FS-Cache: N-cookie d=000000000df64cd0 n=0000000090d24f5c [ 1383.371321][ T4011] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000100)=""/175) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f00000000c0)=0xb5, 0x4) 03:43:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:53 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x0, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1383.880746][ T4188] FS-Cache: Duplicate cookie detected [ 1383.886280][ T4188] FS-Cache: O-cookie c=00000000e2ad8549 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1383.895278][ T4188] FS-Cache: O-cookie d=000000000df64cd0 n=00000000710ba3ed [ 1383.902704][ T4188] FS-Cache: O-key=[10] '0200020000807f000008' [ 1383.908955][ T4188] FS-Cache: N-cookie c=000000008adc3730 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1383.917710][ T4188] FS-Cache: N-cookie d=000000000df64cd0 n=000000000268ec70 [ 1383.924993][ T4188] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") prctl$PR_GET_SECUREBITS(0x1b) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:53 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x0, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) [ 1384.192938][ C1] net_ratelimit: 22 callbacks suppressed [ 1384.192945][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1384.204469][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1384.332623][ T4464] FS-Cache: Duplicate cookie detected [ 1384.338380][ T4464] FS-Cache: O-cookie c=00000000ed372ab1 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1384.347289][ T4464] FS-Cache: O-cookie d=000000000df64cd0 n=00000000a75bea36 [ 1384.354531][ T4464] FS-Cache: O-key=[10] '0200020000807f000008' [ 1384.360646][ T4464] FS-Cache: N-cookie c=00000000a4feb043 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1384.369363][ T4464] FS-Cache: N-cookie d=000000000df64cd0 n=000000008fd672db [ 1384.376617][ T4464] FS-Cache: N-key=[10] '0200020000807f000008' [ 1384.512943][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1384.518734][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:43:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 03:43:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x8000000001, 0xffffffffffffffff) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) fstat(r0, &(0x7f00000001c0)) connect$netlink(r1, &(0x7f0000000180)=@proc={0x10, 0x0, 0x25dfdbfc, 0x100000}, 0xc) 03:43:54 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x0, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:54 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(0x0, 0x0, 0x6) 03:43:54 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x0, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(0x0, 0x0, 0x6) 03:43:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) recvfrom$ax25(r1, &(0x7f0000000100)=""/23, 0x17, 0x40000040, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) 03:43:54 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1385.242980][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1385.248935][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 03:43:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(0x0, 0x0, 0x6) 03:43:55 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x0, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:55 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x0, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080), 0x0, 0x6) 03:43:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) [ 1385.882945][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1385.888843][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1385.894755][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1385.900770][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080), 0x0, 0x6) 03:43:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x8, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000100)=0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) 03:43:55 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x0, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 03:43:55 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080), 0x0, 0x6) 03:43:55 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000380)='/dev/bus/usb/00#/00#\x00', 0x3ff, 0x100) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000500)={&(0x7f00000003c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x5c, r1, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1ff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x80000001}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x41}, 0x80) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x20000, 0x0) r3 = mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002, 0x140111, 0xffffffffffffff9c, 0x3) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000240)={r3}) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000280)="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") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r5 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r5}], 0x1, 0x6) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000010}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r6, 0xd7ec8f9a64214484, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xf6}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x8010}, 0x8011) 03:43:55 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:56 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{}], 0x1, 0x6) 03:43:56 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:56 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept(r0, 0x0, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000100)=0x17, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000140)=""/175) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) [ 1387.016486][ T5432] FS-Cache: Duplicate cookie detected [ 1387.021987][ T5432] FS-Cache: O-cookie c=000000001cd1ad05 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1387.033575][ T5432] FS-Cache: O-cookie d=000000000df64cd0 n=00000000dfe18656 [ 1387.040804][ T5432] FS-Cache: O-key=[10] '0200020000807f000008' [ 1387.047011][ T5432] FS-Cache: N-cookie c=00000000bdd40be2 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1387.055753][ T5432] FS-Cache: N-cookie d=000000000df64cd0 n=00000000134aa739 [ 1387.063062][ T5432] FS-Cache: N-key=[10] '0200020000807f000008' 03:43:56 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{}], 0x1, 0x6) 03:43:56 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3f, 0x3fe) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) ioctl$TIOCEXCL(r1, 0x540c) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000000c0)={0x3, 0x1, 0x0, r1}) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000240)={0x1, 0x9, 0x4, 0x2f6}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x6) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={@remote={[], 0x2}, 0xc, 'bond0\x00'}) 03:43:56 executing program 2: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x0, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{}], 0x1, 0x6) 03:43:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) r2 = getpgid(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r1, 0x0, 0x2, &(0x7f00000000c0)='y\x00', 0xffffffffffffffff}, 0x30) fcntl$setown(r1, 0x8, r3) creat(&(0x7f0000000140)='./file0\x00', 0x10) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x5) 03:43:57 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x0) 03:43:57 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:57 executing program 2: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:57 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:57 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x4, 0x101101) r1 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x40, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x654040, 0x0) ioctl$PPPOEIOCSFWD(r3, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x3, @empty, 'bpq0\x00'}}) r4 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfffffffffffffffe, 0x8000) ioctl$sock_bt_cmtp_CMTPCONNDEL(r4, 0x400443c9, &(0x7f0000000000)={{0x3, 0x100000000, 0x8000, 0x3ff, 0xfffffffffffffff7, 0x1}, 0x9e}) poll(&(0x7f0000000080)=[{r4}], 0x1, 0x6) 03:43:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x0) 03:43:57 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:57 executing program 2: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x0) 03:43:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x5, 0x0) poll(&(0x7f0000000100)=[{r1, 0x18}, {r0, 0x2000}, {r0, 0x100000000000110}, {r1, 0x2000}, {r0, 0x2}], 0x5, 0x800000400000006) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x8, 0x511080) 03:43:57 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:57 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:57 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:58 executing program 4: mkdir(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:58 executing program 2: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:58 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x5, 0x0, 0x80000000, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000200)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x10ffff) write$P9_RFLUSH(r1, &(0x7f0000000000)={0x7}, 0x81c6) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) lseek(r1, 0x0, 0x3) ioctl(r0, 0x3, &(0x7f00000000c0)="0adc1f123c123f3188b070360c8b1d3091a627431bca79c6094c12a5ed703658970df187026f19db7e46504ef669719c475e1e261d6b602972f2d68697b1d18813991d4fec36e877c24cd6efe32733cb4325f4ceb2d809b0cc2fa5e0c10deca886") r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) write$binfmt_elf32(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xb51) poll(&(0x7f0000000cc0)=[{r3, 0x100}, {r2, 0x420}, {r0, 0x30}, {r1, 0x8000}, {r3, 0x4000}], 0x5, 0x5) 03:43:58 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:58 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:58 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:58 executing program 4: mkdir(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:58 executing program 2: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:58 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x5, 0x0, 0x80000000, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:58 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x5, 0x0, 0x80000000, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:58 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:58 executing program 4: mkdir(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x201) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:58 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x5, 0x0, 0x80000000, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1389.392971][ C0] net_ratelimit: 18 callbacks suppressed [ 1389.392980][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1389.404510][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:58 executing program 2: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x5, 0x0, 0x80000000, 0xfffffffffffffc01, 0x0, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:58 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:58 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x5, 0x0, 0x80000000, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:58 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0xffffffffffffff50, 0x800000) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f00000000c0)={0x674be156, 0x4, 0x5, 0x6, 0x8, 0x10, 0x1, "5fc58c922f00e73d87dcf58cea51a45eecf01709", "6e3b4cc358e60978c71aea34c515aee81b947d6c"}) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x32b4, 0x14, 0x3, 0x322, 0x70bd26, 0x25dfdbfd, {0x7, 0x0, 0x2}, [@nested={0x2118, 0x10, [@generic="e6cc9ff786ff82122bd0dd3dfd8ea1194da2a4758acad980333adaf2be82fb06805116a24f84eada936a218a9746a047d0122c57901a75d5013bbe0deafe41df05539e5aa6c43df0589bd08e1bd56dcd451e8a3da6748258b7235f8520167066a75ae8992cc478a5f4c5732c88bbc13d62a0ab6a6431027c35fa53b654d2e5908a31522d1c53e6c2832207786567e762107df4888486c20a868cfb56c76e45ac281ba3f258bc", @typed={0x4, 0x7b}, @typed={0x3c, 0x46, @str='(security]vboxnet1posix_acl_accesskeyring.}/em0]]GPL*,\x00'}, @typed={0x1004, 0x2, @binary="c8a00dad6e578308924663c2b04eb65c7062118c7f3f34a8ccdaae805958a1cfc8c5bcf6b2edb9bc784fc3549bd7d8eef5aa7e497989906812fcf1f8774f313bb77f0c95ce4ba6ab9526660bec6cb0050bb954def10a5a518dfe3de6f232a5d49f525d81a8107689237177b422b53a4433c3a012ef42b5bec882b34fc893b81baf257b88635f0a36d907a592373a2e4c91327ca87bcaa277a2dfc21027a73b10beaef2fa7003e2b088f779ff6906ea68ceba09eb3eb1e3e0e0ae4d4f0f3a5b50db7fc91399a4405a6340720e8e4e706b86ee18b01b5455b9bae048d60beb40452a72ef7244a24d5cd0f484b526079cd3405366247263b30a978e371667bca7f54fcf98ae5f9bee3769fd626fe4a8a5fde01799125a48c23dab88e7d49d66d05ccb1e6f839c209948d9ff194fe63e705bb1f905c356f0006705932b5273104a4a88399f418ebc5fade8a521e6254da6fa55a4a8125bc6d2f169a91383636d1396d2abb0dade741d85216a3c3b75934cf27743c8e84b8291aac3fe6435361ebbbb964a66f097da1d4928e90d4b9669da892ddc7c0ca2d9340b7298148f90781933a02f8c236cb8bbfb12726edee59574812f48eb986ef25b99d4e87c9a15da6d91c3b65436b0b656d7a554dbd60bd078bdf186ea2d449b217655b6f7c7e174dffb9dd81c34040217d8dcc259ad3ef24d50c31ffa74f807acd4e8cc4b4b236cb4c5efe346bee062fac26bf793c573bbbe2a39d809766327ce2ec23a04d4eac34343723346fd4f0a006848135785518aaa38d37548279c33dbdfe47291a37e058d6befb85b81ec9e2a5ed446e0759dbd7b1695432011fc53e0046f226be99972786e9a62521769dece6537cc6cc3d11aca84f8e3373019121ce95fd0eb9593176214b833397ad5053e09f98652000d0e0cb0651493e079274330451ae1849ac8a592083a724b574984ca31d9a401fc407e25edf40e7e2ec60a48f9505960118a6914d38cc994a9e47c7e0b4b9c9f4f501fa15563c9447866751f5a59a4a369c3eb28e36c0f4d8d4ed2fb7dfa482e010fc1702d1a8197ffa77ab9b89ed2805579030bfeb6196b77dab735cc62cbb5520dd5827ff9cf846fc343da70b847a200ce0c9aa902eca21ba381316f354993235a2fc9328ae46251a4c4bb4890ea637191d0d5aac3e88dcaea8facd46927b8ab1bd8cdbf55dccee4a0a9c2ed0b5c473144b3cae62df27faceb8a4a02d29150913f7058863475ad5f2c1c7aed1ea00929a17695a26766d450b35bf5e9781fd2d40472130ebdf7906bd66c449c25d8c610575995ea0556219dd8d42bd5660006d141c2fa37b14dcd112a3aed73445c086f0fd651d19eceecf24b4b2cb3358ccef45d7de1579c7415163a8e3f7c6f81d2bd0b0bb5ebbb53601e96af9e0867a53a0c434d19046079b126c15a44939289d8a71b4361a0ba3ded50baa28d2b277cb815cafa3254ea4e885ed3748b1d48fce18fc09f9838d42f7f3bc69be82e4c8e5272798cfe219430313e3c1ad6e866fc2a080355cca24ebfe964687da07da13d2856bee294f4a537e09477be787820b44b255fe0c7b10514bd30df6214b981d0cf03ef6eeca3efa455a77b194d8507a67b14d582e28ccd31c4b76094648e45a4f194d4da4a0bea8f03072c933f687b1c9ed7616f62cc6a3fe42e9635418a7d9a76838c6eefd80b1652757edd444d414f997849af5d5d89c8b7ace08f72b9df082d223993cf3509cee8ff0f35abfc9fcb1fe65672361591174a1a554388c5cf708ee1c9bc71ca7e9ccd8861c6f4b8eaeb3f02b2d6565477abd0fbab8b8c1d3894861825413155ae386bb45a039bde84888d427fdecebf1e7ef86cda527fd7b9e74c32ae61f5fb0119a8e5b1e5f642d2eff7165ea16f6a30e1be80103797d13095fd3ac97382e623e6bf90de21363f502293a259cae04a0e11afbb4cac8ada44d50759fae160c0808a838173b9d3cd0123d19d108918ef8f91c0f928ac8882ce9bcad6439eb56d702f83697c1bddf478a8158265a9850df37759ed97d868a88f34c7b9b02f2eb7a8382485d858224ce7c4ccbb3756541dcb8bc33dffc8e016df91e1d9e8a23691d23628e3c95a7c915ae932cf99ce35379cdd1f9b5a051e241b71a023596a80f30d2182208799e0ad9e9581e53b5ea67620a039a55d8d9b5bb9f1bd80c5ac0d07a144bcfb3598ffd17a400395ef7712cf249b2bb60086b6d16a537cebc061356a34339432fb1aceef588ca4573e644cb14e62373e9550ee5de70dfc3b6378a6cfe4e2087fda55cb2a5b083c197e2b133d2411367a326c4d5dbc08385d9d8c1fcb99966f822fd7c9d3d62665c7f8921a34f000c64a1d5ce81f5b54954a2a0eabac20c1cffc14ff94ef7ef8a3cd2b1041032c5994ebe71d997f32a1fed464f99d2a45d30cd0ab0f50885ddb59279a78e034cb666903e8ec12a31db6c8bc2a23fa43c221323e574d4ee7bd5ba5b65bcb2f03c397ee88772de8c1354b7d06a9e3d920c69fe54b2e9a6d9940ba480293bb36ea33f1501955c8245d4715190d542a37b28d7315b783a1dbddab52690730220a97d059f19c8aa752dfd9a7633c29bfac1b9e0c9a3becab82559d8939d35df676c6817e4ee97684df9e5fe66e6e13af2fcb4d1bea99048908d8492710ae12b9cc1d7ab4ddb30b667303bee121625aaf81c27690c5907dce4ad1e54a4ab83b6c4b3d4991034ad4afae82bb23581328ee8d1c4d99e67730139fbb0f536af4eb9979db8ede41e034acd1c5847c336d41aef764e9ecea730d1d5de9a1c544589f4544ab3bf48e587c36e9955d65345309fa3961bf4fe7ddbdbcba13c7ee54d84642138ad5821b5beae0cf1c838832e9551038a03346016ba45422616a4bcee2af2ef1cc98208c7d249643fdcd0873f931c272df235777287178150b2214d05064a848033d50b1158064b8bb6e8c2b52aa67b4dccef83cbaf70738adc80b77fc0b5ff748f9bea8f5400ad09ec73dad923dddea83e8049fd68357317e33e0cca9cdba264f6b86c14727a0e5c1c907a8d55b1fc16e6237b0124c0a37ed44c27711d96c7fa55da147c516349fb42562350b1971d78071dec4fe64a39e070f607b9678759fdc7e85d77bc81e7186c80b8fce6c92695dbd965e1b3500d62ccdc195b19954eb1b761f661cdf5a7a19f1da22e2e4be10dd42ab76be30450ac0bbc22c2de5242e2961869a053aa6db16685d387fe7f1ef334ba47f2f5b7fcf4e1527565df9961465fac732e8883ed35403681f33dc4d5936a0a4f0388c741fa1d826300e7112f63e458d5b5f15841c32c2ebd0fa745eec0a246f8e0862ce4c76161443871ed96a7873bc81b4e8e0c86ef8451220e0e47fbde7df0ad78faea311581040404d74c81d75381ef49fa7b579934cee20d4056cb3c2803e45e9037d9014330ed8f765b791c754d43aba9fe91195a7fea0d086881eb2f7dc3371998a3c3e5e3593018f3758fec0c73a834441feed7dcf8e46a741edf7681fdc05d1f7bbadd8baa18839afe4129a4a6982a803950eef24ef601a1661ab3bb0e4ea292b60633c925e4e30fb5a6f45f54b6ddec8c6e414d6551b73407cc247feca18d961eb69d251241860cc7d128d84b3db2c4454ca4894970cf0fbfe51e43a3f05e627751a48c0be7920f9952b2ffc6d6f760a7d060d7a3908aa73b68e2d6a181bcf98e32117c4163d87e9c18c3fca79e931ebcfff48fd999856799dbf742825090a4232b9c728c14fd2b118de735c2e6ed3ab711acc097102c053ec75ec608f6db4b2d78e639c52c91c08aa047395bea9a1beec1d4086b840ac42858a040fcb41f34cb21d0ca30a00c7ce81dc5aed1d3d4138517aebf17371eb131f5d9d964b92b5c274dfba279d496df7ac74b9b0477dea93c1c255ae15c149a7121bc2ad9674ba9547578500fe5ce0bf7403f301c7198add51c29947abcf25b06d3833445aee0ce6d8265fab4fcbbb4fbf029ac2c6e989602af7f8a1beb782be891470a8bab3b258121660f92decf80c711eb700199a80ff18503d2aa57c8afd3b41a2ed2cb37937c540333b5f5e37d4d43c2832a5bef7e500405a96ab072cbb35650c6e26f9b98000f655a6f62fadbb7365f15db163dd5f459bd9fa040fa90852bccface8a38d7484974ada7a84f9fe9979d04c751489e775c35e5e11b1b5272d19937cf88df518d50061c8a592aa24b5410bb9f7ac0a6244f72f2d84ef7f85b560e6317dcbe1529062ba2c3fe7390988587b9236f2472f55c1cddafba3b621ba2db2ff994afb7aa7f5d02ea67b78db6f66effd68355dcb2aef5626d184e4fe716ce0267360a3c71baff82c483b077eaf2d006ec79e300ad355f6eef1f70ca947282276c797e1450e03b19a29f76766d0245ed92b62b74766023a505a48035ab8acce9ceb43c6e06355e29b79d578e46c8136ed5b0b7c3f1bda178857d39fb4961b3af34b7e20e24ed3927eaf0cd3aacdc2eabf4a523e0d4a498becb3e62aab0c579f3162978b53798e5c977424093e3381b93c1b5fad0a7b921184e325f7b08cc7e4e86744ac6c098c87749b999a76b46de40d652a78c5171efdfa60fb0c48e32a6931c201ee3d1b0c20f17c56a0976429bc149f5077526c5d6b2c2fff3b257e74b80bffeba51fbdb95d1fa318ac60252ec371a83b09e798e87c896e52bdfd657475bb3e5b810fe837936026995266dacc59fe64b499f54207a16b9d344e27dc4cc44b007c60a5ea8d7c94375eeeb81d01d869f3b12aa30764b1c75b739f798193d2f44ee5f8ff9fec0338ad3b07775dabae96b5762017a3fc9c8e6a9f85e51ca0c590dc68f154667a85665412225eb630de00dcd5de4ad94774503631ca5dbe3e6aa473fcab5124ab43b9d8abf39ccac458b9cbe396a4a3b6b90114fe22457fd56fe6f09596734baecd71e21af9ccedb5fa89a75e2aadad6322327bc855cfdcc0dc0a071eaa79bb6cc5f42a0db77fadd5871b95a06134d8f4072400265ff25433d6a5b72dc5fbeab738e6b029fed49f4ec02e2088d21ae21b176fd1593fd97ab9aabbfe9e53dee7f9b0211c1977733f712d6d6749bdc6071864174fa51f08c6c1fdd6c945072957fd33e052d73dd67f58dffa3e48abb666b7687837ee7fa8e6d00072b4ee2cd199d8925842d34f0ee071903a2aabb123eef512d5bc913979e33ed121f7593e3cc69b28e5c9721e34131c0e8d2f0c73c5aa5d68775d60bc6a87d9a7a697be1aec4e8be29e479d989b821c1896072b4411535efc9e01db05ab48986144fc91c4f9f9855132d68ce38fc6b6c3cbf26dd4b14d6237244581ce90e828a84507c74178803fe2d13e4f722391c680265d452cf5c2475878da55b9c4d74d06eab220f3dac2348c7b490a6593740e70f1056538408efc3b1b0ca8d98b9b83362873ccf5dca6698fb3086bcff4465fc610e577636bfce5f4101d28625b9da9a2ef6f5586d9d22809e16ef03d833183d69d2740987487c32963df8dfcbb4b3763dee5e3676970c4d70c91e34ea5d7a942a8adbdd6c5b9156201ab00d1b582562ccf96abbb9a5a8156386e0ff714453c3c36d6904f80446807c61a1799fa81d7680f0a8fb15d5327f1a0d64c19d96b5f439b58c261215100533d11e6161a2f5411667c002be3fd5797a9d909526356f72f17ba1da867f69614bcd25c72002f8c479f33e4c13b2cd2c98b3768df85c1c628851ae6121bc0f48f180309ac3061fc6bf323089750a006003123cdf183883006d2ce48c596907b36a07a6b4fe568e3f460869bd883ee5b6e1d360574c7"}, @generic="dd879d79a23fc99c0b7b5d3b", @typed={0xc, 0x41, @u64=0x5}, @generic="3025c4388fd08a5eced94d0907cde3", @generic="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"]}, @typed={0x4, 0x33}, @nested={0x38, 0x77, [@generic, @typed={0x8, 0x4, @fd=r0}, @generic="e085eef8fc610cf2f45e045b25fa9b7e6e244e19dfbf3e59a23ba2bba2423fc70054e8e5aeb182cdbba9538e"]}, @generic="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", @typed={0x8, 0x35, @fd=r0}, @generic="13849f7fb5da5d6f33f201a93f9a510554988eef83927d53da2d36c0359011b44079f6658d0f1bd9962e97302dc10ce9391a7e4960e9fa20641f9358802b6667d0ab38642d9cdac7f2963bf63b934a5d421253f9ddd8273db5b4f82789d28cde30661619cd35590a04188e295dba75f771e9d7771b6fd825b68d99e84ce1727dc532ed8a90878c2987825b31fde211e1c94ed6af10", @generic="aac2caef11d8b905312487ed811bbc41fed48e4e65b636e60cb990ce6feb917ce64810acdf94c09ed40663c569c2ea79fc1373b8cb0c36d0eade7dc13ab7dcd690f79b32bc6a762480cc7aae7c87563ffd514740863b27ed8d385be573975244941c4f92d117ded6e70592d070e03b3d618979136d07d41195d0d719a30202de3cf95290366d17c9d040646c51a4d5e1b612819fe48d4b1a9f5e0c9c1045a0c498733ed35bea592c03a09b286de990"]}, 0x32b4}, 0x1, 0x0, 0x0, 0x40000}, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000003600)={r1, 0x10, &(0x7f00000035c0)={&(0x7f00000034c0)=""/209, 0xd1, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000003680)={r1, 0x10, &(0x7f0000003640)={&(0x7f0000003480)=""/14, 0xe, r2}}, 0x10) 03:43:59 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:59 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x5, 0x78, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x6, 0xf20, 0x200, 0x2, 0x300, 0x8000, 0xffffffffffffff00, 0x2, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x3, 0x51, 0x6, 0x81, 0x1ff, 0x6, 0x41, 0x5, 0x4, 0x6, 0xbf2, 0x0, 0x401, 0xd6ae, 0x0, 0x401, 0x1, 0x0, 0xdd4, 0x0, 0x0, 0x3, 0x5, 0x0, 0x80000000, 0xfffffffffffffc01, 0x0, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x99, 0x7, 0x2, 0x3, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:43:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) timerfd_create(0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$l2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000100)) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) getpeername$inet(r4, 0x0, &(0x7f0000000180)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x80a00, 0x0) ioctl$KVM_SET_MSRS(r6, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x40000071}]}) 03:43:59 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:59 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000080)={0x4, 0x20, [0x3, 0x94, 0x7, 0x9, 0x2, 0x10, 0x401, 0x7]}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x40000071}]}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 03:43:59 executing program 0: r0 = syz_open_pts(0xffffffffffffff9c, 0x8000) ioctl$KIOCSOUND(r0, 0x4b2f, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x402000, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x1, &(0x7f0000000100)=0x5, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000140), 0x0, 0x6) 03:43:59 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1390.032929][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1390.038809][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1390.044718][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1390.050802][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1390.056653][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1390.062419][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:43:59 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:59 executing program 1 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:43:59 executing program 5 (fault-call:6 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:43:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) timerfd_create(0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$l2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000100)) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) getpeername$inet(r4, 0x0, &(0x7f0000000180)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x80a00, 0x0) ioctl$KVM_SET_MSRS(r6, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x40000071}]}) 03:43:59 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x6) 03:43:59 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:43:59 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1390.432988][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1390.438813][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1390.450529][ T7016] FAULT_INJECTION: forcing a failure. [ 1390.450529][ T7016] name failslab, interval 1, probability 0, space 0, times 0 03:43:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) [ 1390.531342][ T7016] CPU: 1 PID: 7016 Comm: syz-executor.5 Not tainted 5.0.0+ #26 [ 1390.538931][ T7016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1390.548996][ T7016] Call Trace: [ 1390.552306][ T7016] dump_stack+0x172/0x1f0 [ 1390.556658][ T7016] should_fail.cold+0xa/0x15 [ 1390.561265][ T7016] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1390.567091][ T7016] ? ___might_sleep+0x163/0x280 [ 1390.571955][ T7016] __should_failslab+0x121/0x190 [ 1390.576906][ T7016] should_failslab+0x9/0x14 [ 1390.581419][ T7016] kmem_cache_alloc+0x2b2/0x6f0 [ 1390.586276][ T7016] ? cap_capable+0x205/0x270 [ 1390.590875][ T7016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1390.597187][ T7016] ? safesetid_security_capable+0x31/0xb0 [ 1390.602929][ T7016] getname_flags+0xd6/0x5b0 [ 1390.607451][ T7016] user_path_mountpoint_at+0x29/0x50 [ 1390.612740][ T7016] ksys_umount+0x167/0xf00 [ 1390.617171][ T7016] ? ksys_write+0x166/0x1f0 [ 1390.621677][ T7016] ? __detach_mounts+0x320/0x320 [ 1390.626616][ T7016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1390.632076][ T7016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1390.637538][ T7016] ? do_syscall_64+0x26/0x610 [ 1390.642223][ T7016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1390.648291][ T7016] ? do_syscall_64+0x26/0x610 [ 1390.652977][ T7016] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1390.658274][ T7016] __x64_sys_umount+0x54/0x80 [ 1390.662957][ T7016] do_syscall_64+0x103/0x610 [ 1390.667559][ T7016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1390.673447][ T7016] RIP: 0033:0x458079 [ 1390.677342][ T7016] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1390.696951][ T7016] RSP: 002b:00007f708fc36c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1390.705370][ T7016] RAX: ffffffffffffffda RBX: 00007f708fc36c90 RCX: 0000000000458079 [ 1390.713347][ T7016] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200003c0 [ 1390.721323][ T7016] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 03:44:00 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) [ 1390.729296][ T7016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f708fc376d4 [ 1390.737274][ T7016] R13: 00000000004c6dc4 R14: 00000000004dc538 R15: 0000000000000004 03:44:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000000c0)=0x4) poll(&(0x7f0000000100)=[{r1, 0x8000}, {r1, 0x8400}, {r0, 0x4000}, {r1, 0x150}, {r1, 0x400}], 0x5, 0xffffffffc2c49308) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:44:00 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:44:00 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101000, 0x0) write$FUSE_STATFS(r0, &(0x7f00000000c0)={0x60, 0xffffffffffffffda, 0x1, {{0x3, 0xf549, 0x100, 0x9, 0x401, 0x2, 0x1f, 0xff}}}, 0x60) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$void(r1, 0xc0045878) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000040)=@srh={0x4, 0x2, 0x4, 0x1, 0x1b, 0x40, 0x9, [@empty]}, 0x18) poll(&(0x7f0000000080)=[{}], 0x1, 0x6) 03:44:00 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0xc48, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:00 executing program 2 (fault-call:4 fault-nth:0): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) [ 1391.116074][ T7375] FS-Cache: Duplicate cookie detected [ 1391.121593][ T7375] FS-Cache: O-cookie c=000000008f9b673c [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1391.130571][ T7375] FS-Cache: O-cookie d=000000000df64cd0 n=0000000022288813 [ 1391.137863][ T7375] FS-Cache: O-key=[10] '0200020000807f000008' [ 1391.144051][ T7375] FS-Cache: N-cookie c=000000008ce70756 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1391.152740][ T7375] FS-Cache: N-cookie d=000000000df64cd0 n=0000000075440a47 [ 1391.160026][ T7375] FS-Cache: N-key=[10] '0200020000807f000008' [ 1391.170198][ T7428] FAULT_INJECTION: forcing a failure. [ 1391.170198][ T7428] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.195839][ T7428] CPU: 1 PID: 7428 Comm: syz-executor.2 Not tainted 5.0.0+ #26 [ 1391.203432][ T7428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.213502][ T7428] Call Trace: [ 1391.216828][ T7428] dump_stack+0x172/0x1f0 [ 1391.221172][ T7428] should_fail.cold+0xa/0x15 [ 1391.225773][ T7428] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1391.231693][ T7428] ? ___might_sleep+0x163/0x280 [ 1391.236558][ T7428] __should_failslab+0x121/0x190 [ 1391.241506][ T7428] should_failslab+0x9/0x14 [ 1391.246017][ T7428] kmem_cache_alloc+0x2b2/0x6f0 [ 1391.250874][ T7428] ? cap_capable+0x205/0x270 [ 1391.255469][ T7428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1391.261730][ T7428] ? safesetid_security_capable+0x31/0xb0 [ 1391.267481][ T7428] getname_flags+0xd6/0x5b0 [ 1391.272005][ T7428] user_path_mountpoint_at+0x29/0x50 [ 1391.277305][ T7428] ksys_umount+0x167/0xf00 [ 1391.281745][ T7428] ? ksys_write+0x166/0x1f0 [ 1391.286263][ T7428] ? __detach_mounts+0x320/0x320 [ 1391.291211][ T7428] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1391.296700][ T7428] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1391.302537][ T7428] ? do_syscall_64+0x26/0x610 [ 1391.307271][ T7428] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1391.313352][ T7428] ? do_syscall_64+0x26/0x610 [ 1391.318040][ T7428] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1391.323513][ T7428] __x64_sys_umount+0x54/0x80 [ 1391.328216][ T7428] do_syscall_64+0x103/0x610 [ 1391.332827][ T7428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1391.338724][ T7428] RIP: 0033:0x458079 [ 1391.342625][ T7428] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1391.362331][ T7428] RSP: 002b:00007f1c7c4bac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 03:44:00 executing program 5 (fault-call:6 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:44:00 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:44:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000100)) 03:44:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0xffffffffffffffff, 0xc003) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) [ 1391.370758][ T7428] RAX: ffffffffffffffda RBX: 00007f1c7c4bac90 RCX: 0000000000458079 [ 1391.378751][ T7428] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200003c0 [ 1391.386836][ T7428] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1391.394818][ T7428] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c7c4bb6d4 [ 1391.402814][ T7428] R13: 00000000004c6dc4 R14: 00000000004dc538 R15: 0000000000000003 03:44:00 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:00 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) [ 1391.584634][ T7593] FAULT_INJECTION: forcing a failure. [ 1391.584634][ T7593] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1391.597882][ T7593] CPU: 0 PID: 7593 Comm: syz-executor.5 Not tainted 5.0.0+ #26 [ 1391.605458][ T7593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.615528][ T7593] Call Trace: [ 1391.618846][ T7593] dump_stack+0x172/0x1f0 [ 1391.623203][ T7593] should_fail.cold+0xa/0x15 [ 1391.627835][ T7593] ? _kstrtoull+0x14c/0x200 [ 1391.632393][ T7593] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1391.638221][ T7593] ? __lock_acquire+0x548/0x3fb0 [ 1391.643180][ T7593] ? lock_downgrade+0x880/0x880 [ 1391.648055][ T7593] should_fail_alloc_page+0x50/0x60 [ 1391.653360][ T7593] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1391.658762][ T7593] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1391.664526][ T7593] ? find_held_lock+0x35/0x130 [ 1391.669311][ T7593] ? __f_unlock_pos+0x19/0x20 [ 1391.674022][ T7593] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1391.679923][ T7593] cache_grow_begin+0x9c/0x860 [ 1391.684720][ T7593] ? getname_flags+0xd6/0x5b0 [ 1391.689411][ T7593] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1391.695669][ T7593] kmem_cache_alloc+0x62d/0x6f0 [ 1391.700536][ T7593] ? cap_capable+0x205/0x270 [ 1391.705157][ T7593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1391.711438][ T7593] ? safesetid_security_capable+0x31/0xb0 [ 1391.717182][ T7593] getname_flags+0xd6/0x5b0 [ 1391.721723][ T7593] user_path_mountpoint_at+0x29/0x50 [ 1391.727029][ T7593] ksys_umount+0x167/0xf00 [ 1391.731481][ T7593] ? ksys_write+0x166/0x1f0 [ 1391.735998][ T7593] ? __detach_mounts+0x320/0x320 [ 1391.740978][ T7593] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1391.746450][ T7593] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1391.751927][ T7593] ? do_syscall_64+0x26/0x610 [ 1391.756620][ T7593] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1391.762697][ T7593] ? do_syscall_64+0x26/0x610 [ 1391.767388][ T7593] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1391.772709][ T7593] __x64_sys_umount+0x54/0x80 [ 1391.777406][ T7593] do_syscall_64+0x103/0x610 [ 1391.782018][ T7593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1391.787968][ T7593] RIP: 0033:0x458079 [ 1391.791870][ T7593] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1391.811482][ T7593] RSP: 002b:00007f708fc36c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1391.819914][ T7593] RAX: ffffffffffffffda RBX: 00007f708fc36c90 RCX: 0000000000458079 [ 1391.827917][ T7593] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200003c0 03:44:01 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) [ 1391.835914][ T7593] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1391.851564][ T7593] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f708fc376d4 [ 1391.859578][ T7593] R13: 00000000004c6dc4 R14: 00000000004dc538 R15: 0000000000000004 03:44:01 executing program 2 (fault-call:4 fault-nth:1): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:44:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x6) 03:44:01 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x400002) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x1, 0x100) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x1, 0x20001) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x0) fcntl$setlease(r2, 0x400, 0x1) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) 03:44:01 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:44:01 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0xffffffffffff7fff, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1392.035174][ T7678] FS-Cache: Duplicate cookie detected [ 1392.040692][ T7678] FS-Cache: O-cookie c=000000002bcef06a [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1392.049885][ T7678] FS-Cache: O-cookie d=000000000df64cd0 n=000000009236bceb [ 1392.057146][ T7678] FS-Cache: O-key=[10] '0200020000807f000008' [ 1392.063317][ T7678] FS-Cache: N-cookie c=00000000256548fb [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1392.072049][ T7678] FS-Cache: N-cookie d=000000000df64cd0 n=0000000050def4c4 [ 1392.079323][ T7678] FS-Cache: N-key=[10] '0200020000807f000008' 03:44:01 executing program 5 (fault-call:6 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:44:01 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:44:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) chmod(&(0x7f00000000c0)='./file0\x00', 0x120) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x14040, &(0x7f0000000180)={[{@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x6}}], [{@seclabel='seclabel'}, {@obj_type={'obj_type', 0x3d, '/dev/dsp#\x00'}}, {@fsname={'fsname', 0x3d, '/dev/dsp#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/dsp#\x00'}}, {@smackfshat={'smackfshat', 0x3d, '/dev/dsp#\x00'}}, {@seclabel='seclabel'}]}) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:44:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0xc00) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:44:01 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:01 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:44:01 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x81, 0x200) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000100)={0x22, 0x3, 0x0, {0x3, 0x1, 0x0, ','}}, 0x22) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000140)={0x81, 0x32315241, 0x1, @discrete={0x5, 0x20}}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:44:02 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:44:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:44:02 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:44:02 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x806, 0x200000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x200, 0x2, 0xfffffffffffffffd, 0x32d, 0xc3b8, 0x6, 0x8, r2}, &(0x7f0000000240)=0x20) ioctl(r0, 0x1000008910, &(0x7f0000000080)="e87ad1b83c123f3188b070") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$VIDIOC_QUERYCAP(r3, 0x80685600, &(0x7f0000000100)) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) socket(0x1f, 0xf, 0x7510) [ 1392.994123][ T8376] FS-Cache: Duplicate cookie detected [ 1392.999635][ T8376] FS-Cache: O-cookie c=00000000499dcee4 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1393.008681][ T8376] FS-Cache: O-cookie d=000000000df64cd0 n=000000001ea4ec7a [ 1393.016086][ T8376] FS-Cache: O-key=[10] '0200020000807f000008' [ 1393.022219][ T8376] FS-Cache: N-cookie c=00000000f45f2b1c [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1393.033456][ T8376] FS-Cache: N-cookie d=000000000df64cd0 n=000000000307cbe8 [ 1393.040705][ T8376] FS-Cache: N-key=[10] '0200020000807f000008' 03:44:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) 03:44:02 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:44:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") getsockname(r0, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000180)=0x80) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x3, 0x1}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000300)={r2, 0xfffe0}, 0xc) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x400) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r4 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x20000001, 0x1) poll(&(0x7f0000000080)=[{r4}], 0x1, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) 03:44:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x1) linkat(r1, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x400) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) 03:44:02 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:02 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:44:02 executing program 1: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0x80003) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:44:03 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:44:03 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0xffffffffffffff81) 03:44:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xd4, 0x80000) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000100)=0x1) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) 03:44:03 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x2) [ 1393.850217][ T8850] FS-Cache: Duplicate cookie detected [ 1393.855913][ T8850] FS-Cache: O-cookie c=00000000d794d1b2 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1393.864860][ T8850] FS-Cache: O-cookie d=000000000df64cd0 n=00000000781e59e2 [ 1393.872079][ T8850] FS-Cache: O-key=[10] '0200020000807f000008' [ 1393.878265][ T8850] FS-Cache: N-cookie c=0000000021bab8bf [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1393.887003][ T8850] FS-Cache: N-cookie d=000000000df64cd0 n=000000005eef0e24 [ 1393.894292][ T8850] FS-Cache: N-key=[10] '0200020000807f000008' 03:44:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x2) 03:44:03 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:44:03 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) process_vm_readv(r1, &(0x7f0000000480)=[{&(0x7f0000000100)=""/182, 0xb6}, {&(0x7f00000001c0)}, {&(0x7f0000000200)=""/17, 0x11}, {&(0x7f0000000240)=""/185, 0xb9}, {&(0x7f0000000300)=""/208, 0xd0}, {&(0x7f0000000400)=""/94, 0x5e}], 0x6, &(0x7f00000007c0)=[{&(0x7f0000000500)=""/108, 0x6c}, {&(0x7f0000000580)=""/23, 0x17}, {&(0x7f00000005c0)=""/74, 0x4a}, {&(0x7f0000000640)=""/144, 0x90}, {&(0x7f0000000700)=""/105, 0x69}, {&(0x7f0000000780)=""/12, 0xc}], 0x6, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0xc002) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000000)) poll(&(0x7f0000000080), 0x0, 0x6) 03:44:03 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x0, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:03 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:44:03 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:44:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) umount2(&(0x7f0000000000)='./file0\x00', 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x100005, 0x202400) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000240)=0x2) ioctl$PPPIOCDISCONN(r1, 0x7439) [ 1394.602938][ C1] net_ratelimit: 22 callbacks suppressed [ 1394.602945][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1394.614461][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:44:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000100)={0x9, 0x7, 0x5, 0x4, 0x4, 0x8df7, 0x1f, 0x0, 0x5, 0x100}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r3, 0x210, 0x70bd28, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) 03:44:04 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x0, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:04 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:44:04 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x3) 03:44:04 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet6_dccp_buf(r0, 0x21, 0xcf, &(0x7f0000000200)="acacb3bc62b27583fb957f11cf782b21ebcb02d6503f888bfbcc24d191bb307669564a650aa83c84c0ecbda4619909db84b79a21323e245380e16fd15473847eddf23fea7278434774d71031fc43f31a58d1474b1fc0b15c485b4265c9dbe95163e8b700077039ed7843d479229bb4cf7b814d819cd36587883bfabda4e9503b4969a08e24f90126c91dae99630d3bcfb807aba232dbf2f663a97a99afc2415a62dd8e5c4a81e4933d9308ff1a13679c46b31578df67734ef839e11f6c4b3aa27b1250", 0xc3) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000140)={0x9, 0xffffffffffff1347, 0x100, 'queue1\x00', 0xbb6}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r3 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000100)=[{r3}, {r2}, {r3, 0x17886ef846f66d36}, {r1, 0x4400}, {r1, 0x20}], 0x5, 0x10000) [ 1394.673831][ T8932] FS-Cache: Duplicate cookie detected [ 1394.679260][ T8932] FS-Cache: O-cookie c=00000000fe527db7 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1394.688279][ T8932] FS-Cache: O-cookie d=000000000df64cd0 n=0000000056a20b87 [ 1394.695524][ T8932] FS-Cache: O-key=[10] '0200020000807f000008' [ 1394.701599][ T8932] FS-Cache: N-cookie c=00000000baad5a0c [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1394.710315][ T8932] FS-Cache: N-cookie d=000000000df64cd0 n=00000000bdb943e6 [ 1394.717540][ T8932] FS-Cache: N-key=[10] '0200020000807f000008' [ 1394.875925][ T9454] FS-Cache: Duplicate cookie detected [ 1394.881391][ T9454] FS-Cache: O-cookie c=00000000fe527db7 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1394.890374][ T9454] FS-Cache: O-cookie d=000000000df64cd0 n=0000000056a20b87 [ 1394.899267][ T9454] FS-Cache: O-key=[10] '0200020000807f000008' [ 1394.899319][ T9454] FS-Cache: N-cookie c=000000009ea3a255 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1394.899330][ T9454] FS-Cache: N-cookie d=000000000df64cd0 n=0000000056e1a2b8 [ 1394.899336][ T9454] FS-Cache: N-key=[10] '0200020000807f000008' [ 1394.927763][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1394.933673][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:44:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000000)={0x5, 0x6ff98f44}) 03:44:04 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 03:44:04 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x2, 0x0, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x3) 03:44:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x3e, 0x400000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000180)={r2, 0x1, 0x6, @broadcast}, 0x10) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x6) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0xc) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="9c0000001f0000008e0a3f4773f39e2296d5cd808dcf92afcc08120cd5c397a87b9890dee236fa172c3c9f1b4e9eab867b1def35e2b24c21f63f694233dbc454f28bc2789bb6d382fedca606f4c80fc85dbd4e982342514ea220757eab713e2e8c3fcdaafd37be9f47422708d53dfc848d5e2567f5466274a7b3aa83f99aeccd9ea5c11431ad37d1f467046a08d9965fc92f116fbde7c7cf2a4973cf"], 0x40000) [ 1395.234220][ T9638] FS-Cache: Duplicate cookie detected [ 1395.245659][ T9638] FS-Cache: O-cookie c=000000005bfacc51 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1395.254614][ T9638] FS-Cache: O-cookie d=000000000df64cd0 n=00000000f9489a38 [ 1395.261821][ T9638] FS-Cache: O-key=[10] '0200020000807f000008' [ 1395.268000][ T9638] FS-Cache: N-cookie c=00000000a7283524 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1395.276780][ T9638] FS-Cache: N-cookie d=000000000df64cd0 n=00000000461d781d 03:44:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) getsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000180), &(0x7f0000000140)=0x4) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) write$vnet(r1, &(0x7f0000001280)={0x1, {&(0x7f00000001c0)=""/151, 0x97, &(0x7f0000000280)=""/4096, 0x2, 0x2}}, 0x68) 03:44:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") poll(&(0x7f0000000080)=[{}], 0x1, 0x6) 03:44:04 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x0, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1395.284048][ T9638] FS-Cache: N-key=[10] '0200020000807f000008' 03:44:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, [], 0x17}, 0x1}}, 0x6, 0x1, 0x3, 0x5, 0x1}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000001c0)={0x656ff1f7, 0x80, 0x4, 0x10001, 0x81, 0x9, 0x6d6, 0x9, r2}, 0x20) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:44:04 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x0, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1395.632983][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1395.638891][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1395.700156][T10084] FS-Cache: Duplicate cookie detected [ 1395.705675][T10084] FS-Cache: O-cookie c=000000005bfacc51 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1395.714667][T10084] FS-Cache: O-cookie d=000000000df64cd0 n=00000000f9489a38 [ 1395.721911][T10084] FS-Cache: O-key=[10] '0200020000807f000008' [ 1395.728105][T10084] FS-Cache: N-cookie c=000000005c3e3bcd [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1395.737061][T10084] FS-Cache: N-cookie d=000000000df64cd0 n=00000000efea765f [ 1395.744323][T10084] FS-Cache: N-key=[10] '0200020000807f000008' 03:44:05 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x4) 03:44:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) signalfd(r1, &(0x7f0000000100)={0x80}, 0x8) poll(&(0x7f0000000080)=[{r1, 0x2000000000000000}], 0x1, 0x6) 03:44:05 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x9, 0x0, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1395.842194][T10133] FS-Cache: Duplicate cookie detected [ 1395.847866][T10133] FS-Cache: O-cookie c=000000005bfacc51 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1395.856807][T10133] FS-Cache: O-cookie d=000000000df64cd0 n=00000000f9489a38 [ 1395.864050][T10133] FS-Cache: O-key=[10] '0200020000807f000008' [ 1395.870171][T10133] FS-Cache: N-cookie c=00000000519a2bf1 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1395.878900][T10133] FS-Cache: N-cookie d=000000000df64cd0 n=00000000edfab5fc [ 1395.886170][T10133] FS-Cache: N-key=[10] '0200020000807f000008' 03:44:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/mixer\x00', 0x80000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000140)) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x40400000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000540)={0x180, r2, 0x302, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xac}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa03795}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xbf}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa01}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1fb5}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}, @TIPC_NLA_BEARER={0xd4, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'lapb0\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xee3}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1d7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x10}, 0x4040801) r3 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x7, 0x290000) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f00000000c0)={0x1, 0x9}) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x6) ioctl(r3, 0x9, &(0x7f00000002c0)="3f9a5c9792feb84959b1584843583b6b3e64e34aef14c6e184a8b87a998d9cf6450c9011e274549bcdf123b713935f46064e61e4d0f6807d01713d793f09710a4149854c071c3206e606b10162f960a9606da3f9584de0d6baacfb6ca6728e077a7463c085196727ab011ceab090117ba486344bbca2bc1b08174ef296d764ee2993d9893612c7817e8c472d76835bb6") ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000000)) 03:44:05 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) [ 1396.058063][ T9752] FS-Cache: Duplicate cookie detected [ 1396.063586][ T9752] FS-Cache: O-cookie c=000000002c887695 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1396.072445][ T9752] FS-Cache: O-cookie d=000000000df64cd0 n=000000005b20806f [ 1396.079713][ T9752] FS-Cache: O-key=[10] '0200020000807f000008' [ 1396.085896][ T9752] FS-Cache: N-cookie c=00000000b8ef5ebe [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1396.094829][ T9752] FS-Cache: N-cookie d=000000000df64cd0 n=00000000dd33d030 [ 1396.102056][ T9752] FS-Cache: N-key=[10] '0200020000807f000008' 03:44:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x4) 03:44:05 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x100, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x8, 0xfff, 0x1, 0xdb3e, 0x1e, 0xb696}, 0xfffffffffffff509}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000140)=0x3) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ftruncate(r1, 0x2) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) 03:44:05 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x0, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) [ 1396.255165][T10372] FS-Cache: Duplicate cookie detected [ 1396.260712][T10372] FS-Cache: O-cookie c=000000002c887695 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1396.269746][T10372] FS-Cache: O-cookie d=000000000df64cd0 n=000000005b20806f [ 1396.277040][T10372] FS-Cache: O-key=[10] '0200020000807f000008' [ 1396.282959][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1396.283248][T10372] FS-Cache: N-cookie c=00000000b13d6f55 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1396.288933][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1396.297622][T10372] FS-Cache: N-cookie d=000000000df64cd0 n=00000000ae8317eb [ 1396.303552][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1396.310659][T10372] FS-Cache: N-key=[10] '0200020000807f000008' [ 1396.316492][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:44:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) setsockopt$inet6_tcp_buf(r1, 0x6, 0x21, &(0x7f0000000000)="d8a8a1338bf46b046e1b1bf17b291f4be8d741c41c169c40b4b621ba4b82b8f740ea73b8fd51f4fd1e7aba4197fd003602b0773acdec66d5", 0x38) 03:44:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x61, 0x80000) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x3, 0x1747, 0x3f, 0x5, 0x2, 0x1, 0x3, {0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x4, 0xffffffffffffff00, 0x0, 0x608, 0x7}}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000240)={r2, 0x4}, &(0x7f0000000280)=0x8) ioctl$SIOCAX25ADDFWD(r1, 0x89ea, &(0x7f0000000100)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default}) ioctl$SIOCAX25ADDFWD(r1, 0x89ea, &(0x7f00000002c0)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x6) 03:44:05 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x0, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1396.682626][T10738] FS-Cache: Duplicate cookie detected [ 1396.688173][T10738] FS-Cache: O-cookie c=000000002c887695 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1396.697191][T10738] FS-Cache: O-cookie d=000000000df64cd0 n=000000005b20806f [ 1396.704496][T10738] FS-Cache: O-key=[10] '0200020000807f000008' [ 1396.710633][T10738] FS-Cache: N-cookie c=000000007e3e6379 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1396.719451][T10738] FS-Cache: N-cookie d=000000000df64cd0 n=0000000007817b45 [ 1396.726806][T10738] FS-Cache: N-key=[10] '0200020000807f000008' 03:44:06 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x300) 03:44:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0xc7, "cde0f744c1666cecd4ce0dbd6cd49fe68eb013d74fc96f9b66ef3a24e86ee514f20808e81ae4f31064aa99e0f03e8abb6c3915d5e2d5751a68cc89311cf302efc303f66d3bd1d95dea5f32be5306dbbb4693e4e5d5f4b465e5cb0d98b171998363ce3f0c4d15acf1705eb38bd8ca33fbf4b5be4de3621893e00cc3b7f0a3315a56b5bc79ed9afab0632d2e7d86633fb4ae16c95f967a8307fa7f06ca84bee5e7a9f72db7aae60b7034fe6e5f747d8bd5464a42b9928f91e7cba8aafc15b709d25d44588e9434c2"}, &(0x7f0000000000)=0xcf) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0x6, 0x30}, &(0x7f0000000240)=0xc) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000280)={r2, 0x400000000001}, &(0x7f00000002c0)=0x8) ioctl(r1, 0xffff, &(0x7f0000000300)="cf964e67bd80ae2e02c41c0d5d58335dad2f6fee5437500b2bc70781e84f8e32ec4945ca052b2be006cebd277f40810b829c02a5a9b501816edb4a32e1e2b247ec87c71900d00764f7c5021e10dcac2d1c0952f10801480f7f15531eb6") 03:44:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) syz_mount_image$nfs4(&(0x7f00000000c0)='nfs4\x00', &(0x7f0000000100)='./file0\x00', 0x10001, 0x0, &(0x7f0000000140), 0x1200000, &(0x7f0000000180)='/dev/dsp#\x00') 03:44:06 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x4, 0x0, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:06 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) [ 1396.992701][T10917] FS-Cache: Duplicate cookie detected [ 1396.998639][T10917] FS-Cache: O-cookie c=000000000d58acc3 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1397.007699][T10917] FS-Cache: O-cookie d=000000000df64cd0 n=000000003b139103 [ 1397.007709][T10917] FS-Cache: O-key=[10] '0200020000807f000008' [ 1397.007757][T10917] FS-Cache: N-cookie c=0000000062d37d31 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1397.007765][T10917] FS-Cache: N-cookie d=000000000df64cd0 n=00000000dc1f30fc [ 1397.007771][T10917] FS-Cache: N-key=[10] '0200020000807f000008' [ 1397.082612][T10446] FS-Cache: Duplicate cookie detected [ 1397.088433][T10446] FS-Cache: O-cookie c=000000000d58acc3 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1397.097376][T10446] FS-Cache: O-cookie d=000000000df64cd0 n=000000003b139103 [ 1397.104651][T10446] FS-Cache: O-key=[10] '0200020000807f000008' [ 1397.110780][T10446] FS-Cache: N-cookie c=0000000017421c17 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1397.119567][T10446] FS-Cache: N-cookie d=000000000df64cd0 n=0000000033330c14 [ 1397.126868][T10446] FS-Cache: N-key=[10] '0200020000807f000008' 03:44:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x300) 03:44:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket(0xa, 0x44f66f351ef176e9, 0x1ff) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') sendmsg$TEAM_CMD_NOOP(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x224, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) r3 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x6) ioctl$KDMKTONE(r3, 0x4b30, 0x4) mq_open(&(0x7f0000000200)='proc\x00', 0x40, 0x2, &(0x7f0000000240)={0x1, 0x5, 0x2, 0x2, 0x9, 0xfefe, 0x5, 0x100000000}) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) 03:44:06 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x6) 03:44:06 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x0, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1397.210693][T10970] FS-Cache: Duplicate cookie detected [ 1397.216356][T10970] FS-Cache: O-cookie c=000000000d58acc3 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1397.225356][T10970] FS-Cache: O-cookie d=000000000df64cd0 n=000000003b139103 [ 1397.232578][T10970] FS-Cache: O-key=[10] '0200020000807f000008' [ 1397.238839][T10970] FS-Cache: N-cookie c=0000000030f024a4 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1397.247923][T10970] FS-Cache: N-cookie d=000000000df64cd0 n=00000000696fd036 [ 1397.255390][T10970] FS-Cache: N-key=[10] '0200020000807f000008' 03:44:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='\x00', 0xfffffffffffffffe) keyctl$clear(0x7, r1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) 03:44:06 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x2, 0x0, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x65, 0x14a4208cf15cb34e) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000100)=0x977) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f0000000180)='{@\x00', 0x3) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)) 03:44:07 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x3f00) 03:44:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x94, 0x0) epoll_wait(r1, &(0x7f0000000100)=[{}, {}, {}], 0x3, 0xfffffffffffff10b) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) r3 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0xffffffff, 0xc00) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000180)={0x100000001, 0x0, {0x3, 0x1, 0x9, 0x3, 0xa2d1}}) 03:44:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) fchdir(r1) 03:44:07 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x0, 0x0, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:07 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) [ 1397.898183][T11559] FS-Cache: Duplicate cookie detected [ 1397.903829][T11559] FS-Cache: O-cookie c=0000000054397d74 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1397.912822][T11559] FS-Cache: O-cookie d=000000000df64cd0 n=0000000051e9b8d9 [ 1397.920144][T11559] FS-Cache: O-key=[10] '0200020000807f000008' [ 1397.926426][T11559] FS-Cache: N-cookie c=000000001a77f1ff [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1397.935205][T11559] FS-Cache: N-cookie d=000000000df64cd0 n=00000000850ae69d [ 1397.942424][T11559] FS-Cache: N-key=[10] '0200020000807f000008' [ 1398.039645][T11019] FS-Cache: Duplicate cookie detected [ 1398.045388][T11019] FS-Cache: O-cookie c=0000000054397d74 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1398.054427][T11019] FS-Cache: O-cookie d=000000000df64cd0 n=0000000051e9b8d9 [ 1398.061667][T11019] FS-Cache: O-key=[10] '0200020000807f000008' [ 1398.068028][T11019] FS-Cache: N-cookie c=0000000066fa61f3 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1398.076797][T11019] FS-Cache: N-cookie d=000000000df64cd0 n=00000000921a993b 03:44:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x3f00) 03:44:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000003c0)={0x3, {{0x2, 0x4e24, @multicast1}}}, 0x88) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000004c0)=0x0) sendmsg$nl_generic(r1, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, 0x1b, 0x210, 0x70bd25, 0x25dfdbfe, {0x1}, [@typed={0x8, 0x3b, @pid=r2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4084) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') mount(&(0x7f0000000200)=@sr0='/dev/sr0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='logfs\x00', 0x20000, &(0x7f00000002c0)='\x00') ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) lstat(&(0x7f0000000600)='./file1\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000780)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000880)=0xe8) r7 = getuid() getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)=0x0) lstat(&(0x7f0000000980)='\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000b00)={{}, {}, [{0x2, 0x7, r4}, {0x2, 0x5, r5}, {0x2, 0x3, r6}, {0x2, 0x4, r7}, {0x2, 0x3, r8}, {0x2, 0x4, r9}], {0x4, 0x4}, [{0x8, 0x1, r10}], {0x10, 0x1}, {0x20, 0x2}}, 0x5c, 0x2) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r3, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x2004c054) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000300)={0x0, 0x5}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000380)={r11, 0x3}, 0x8) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:44:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x3c8) 03:44:07 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x80000000, 0x0, 0x0, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1398.084071][T11019] FS-Cache: N-key=[10] '0200020000807f000008' [ 1398.167908][T11631] FS-Cache: Duplicate cookie detected [ 1398.173589][T11631] FS-Cache: O-cookie c=0000000054397d74 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1398.182474][T11631] FS-Cache: O-cookie d=000000000df64cd0 n=0000000051e9b8d9 [ 1398.189784][T11631] FS-Cache: O-key=[10] '0200020000807f000008' [ 1398.195999][T11631] FS-Cache: N-cookie c=00000000fb2c3f4d [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1398.204771][T11631] FS-Cache: N-cookie d=000000000df64cd0 n=00000000d64d3cc0 [ 1398.212004][T11631] FS-Cache: N-key=[10] '0200020000807f000008' 03:44:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x40, 0x4040) poll(&(0x7f0000000140)=[{r0, 0x100}, {r0, 0x400}, {r1, 0x8000}, {r0, 0x4000}], 0x2b4, 0x6) 03:44:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x18, 0x32, 0x8001, 0x0, 0x0, {0x4000000001}, [@nested={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0a620a123c123f3188b070") r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x40400) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000100)={0x11, 0x25, 0x15, 0x18, 0x3, 0xffffffff, 0x0, 0xa0, 0xffffffffffffffff}) r3 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x6) 03:44:07 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x0, 0x0, 0x0, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x7fff, 0x400000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="16dd3f00b31afbc544e9c59aefbfa94c476f07b8ecfbed756d698495a6b7dd6ad97c3399c6aa0c10e4ead70b22b0c859e344e21732999688415f0f3675d7cbcbce3c1672d84cbab9436f0320fc8a6eabc6c19e00bb69cdb1c4af42495e2bcc22d5543c9e2300f64703718f31267ecba0bdabb3f09ee922f995b078d8a3caf7266944e0a4d8dcc05a693394f8929a626cbc77273b88826df7cc9f348a436b39aa5a470bfeb043d3f07c09f143dd565eb84d5a97e39d8999af7126abd875e296bcdc58528d254c9457993f8c410e", @ANYRES16=r2, @ANYBLOB="010028bd7000fcdbdf2504000000380004000c0007000800040004000000140001020000006164636173742d6c696e6b00001400070008000200fbffffffed000300010000001800020008000100b50e0000040004000800020000100000080005000400020038000200040004000400040008000100040000000400040008000200ff7f0000080002000700000037970c5524291ffe65ee5b3a6460bcde8669b7dc"], 0xa4}, 0x1, 0x0, 0x0, 0x44800}, 0x20000000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f00000000c0)=0x1000) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x6) 03:44:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000000)=[{r1}], 0x1, 0x6) 03:44:08 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x4000) 03:44:08 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0xfd, 0x0, 0x0, 0x0, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:08 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) [ 1398.818993][T12214] FS-Cache: Duplicate cookie detected [ 1398.824584][T12214] FS-Cache: O-cookie c=0000000079dc91c4 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1398.833557][T12214] FS-Cache: O-cookie d=000000000df64cd0 n=000000001373d4f7 [ 1398.840773][T12214] FS-Cache: O-key=[10] '0200020000807f000008' [ 1398.846953][T12214] FS-Cache: N-cookie c=0000000048b2f657 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1398.855698][T12214] FS-Cache: N-cookie d=000000000df64cd0 n=00000000192885ab [ 1398.862986][T12214] FS-Cache: N-key=[10] '0200020000807f000008' [ 1399.013489][T11735] FS-Cache: Duplicate cookie detected [ 1399.018921][T11735] FS-Cache: O-cookie c=0000000079dc91c4 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1399.027875][T11735] FS-Cache: O-cookie d=000000000df64cd0 n=000000001373d4f7 [ 1399.035168][T11735] FS-Cache: O-key=[10] '0200020000807f000008' [ 1399.042036][T11735] FS-Cache: N-cookie c=000000001e4719f5 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1399.050911][T11735] FS-Cache: N-cookie d=000000000df64cd0 n=00000000a39ebe5d 03:44:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x4000) 03:44:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xffffffffffffff56, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:44:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r0, 0x118}], 0x1, 0x6) 03:44:08 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1399.058323][T11735] FS-Cache: N-key=[10] '0200020000807f000008' [ 1399.143824][T12311] FS-Cache: Duplicate cookie detected [ 1399.149294][T12311] FS-Cache: O-cookie c=0000000079dc91c4 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1399.158405][T12311] FS-Cache: O-cookie d=000000000df64cd0 n=000000001373d4f7 [ 1399.165782][T12311] FS-Cache: O-key=[10] '0200020000807f000008' [ 1399.171926][T12311] FS-Cache: N-cookie c=000000002aeed1f5 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1399.180687][T12311] FS-Cache: N-cookie d=000000000df64cd0 n=0000000010e7f947 [ 1399.187961][T12311] FS-Cache: N-key=[10] '0200020000807f000008' 03:44:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x100000000, 0x1000000040) fchdir(r2) poll(&(0x7f00000001c0)=[{r1, 0x400}, {r1, 0x10}, {r0, 0x8000}], 0x3, 0x6) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000100)=0xffff) sendto$inet(r3, &(0x7f0000000200)="d36f7afad8330a47010d186d7c001f78a928a252cff1d9de05f5e7b6183f32ff3587a71fe0b5cbfac33b3834705f97d608803a8a2ae00a8f672b40a804f27d66225516696e925f1829aa5fa4cb241695d102fb", 0x53, 0x4000, &(0x7f00000000c0)={0x2, 0x4e21, @multicast2}, 0x10) 03:44:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) syz_read_part_table(0x2c32, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="57905a26473bfd0568f025383539fe01d93c5457fefac76deaffcaa97eabb335387682eebde24ffaa75936005518133db8be1689d6feec71567b19ac0253d38cc28368e3365853ba0fdbfdd39fb7741a88a91471db904392533bb4f9ee3430c08e5fd39b062515b762503bb0c3e2560a50c90d38143dd151638365bbdc0cb17f5ed8a270e418e0609355f8aa4cf9b8d8268604bb60de8742965ba1e0358311dfff6e32c6d5bf7a32380ec802f3807465de384180eb93b83139f2a0ea7bdfb891bb9587e7eb3d05165c5710d3afe8cfa4555069d408e43b765d7d67683881c8d2d4949f22552ee510b5dd04c14d00d38bfefa8eb7bb675f", 0xf7, 0x5}, {&(0x7f0000000200)="1f3b54cf785fc39990b94c006be9e4946d69f0cd9354bdf46480178df92e3ec100cbe453197dcefe433494a11aabca375ba4af5df6a34dd99a2ff0ec9eb84f3c1405be94ceeb6a3e5f54fe2c047604ad62cfdba553c969546441572ad4fe38aa5f18106ed2f1ad2990e4a359402fc92ce329c7c6b6008b7a63749ff6a00b196c47", 0x81, 0x5}]) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:44:08 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x100ffc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f0000000280)=0xe8) bind$xdp(r1, &(0x7f00000002c0)={0x2c, 0x0, r2, 0x19, r1}, 0x10) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) [ 1399.384946][T12543] loop1: unable to read partition table [ 1399.393561][T12543] loop1: partition table beyond EOD, truncated [ 1399.411838][T12543] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:44:08 executing program 1: syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x1, 0x1) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}]}) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:44:09 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x40000) 03:44:09 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:09 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) [ 1399.769666][T12944] FS-Cache: Duplicate cookie detected [ 1399.775303][T12944] FS-Cache: O-cookie c=000000004c8d0697 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1399.784246][T12944] FS-Cache: O-cookie d=000000000df64cd0 n=00000000904aaecd [ 1399.791461][T12944] FS-Cache: O-key=[10] '0200020000807f000008' [ 1399.797676][T12944] FS-Cache: N-cookie c=000000008ed51257 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1399.803592][ C0] net_ratelimit: 20 callbacks suppressed [ 1399.803654][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1399.806765][T12944] FS-Cache: N-cookie d=000000000df64cd0 n=000000008d595a61 [ 1399.806775][T12944] FS-Cache: N-key=[10] '0200020000807f000008' [ 1399.812967][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:44:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$TIOCSBRK(r1, 0x5427) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x6) 03:44:09 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x40000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800001}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x9c, r1, 0x304, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7ff}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x48}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x9c}}, 0x81) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x80000000, 0x107, "8868abc16a79b23adf1c8cc9bb6b70e1a8e7ccbffab4a03abeb473959e6e2d62", 0x3f, 0x40, 0x4, 0x5, 0x1, 0x7, 0x5, 0xff, [0x0, 0x538, 0x7, 0x100]}) r3 = getpgrp(0x0) prlimit64(r3, 0x3, &(0x7f0000000000)={0x101, 0x4}, &(0x7f0000000100)) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000440)={0x8, 0x1, 0x100, 0x3}, 0x8) r4 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r4}], 0x1, 0x6) 03:44:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x40000) 03:44:09 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) [ 1399.981669][T12949] FS-Cache: Duplicate cookie detected [ 1399.987190][T12949] FS-Cache: O-cookie c=000000004c8d0697 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1399.996167][T12949] FS-Cache: O-cookie d=000000000df64cd0 n=00000000904aaecd [ 1400.003432][T12949] FS-Cache: O-key=[10] '0200020000807f000008' [ 1400.009564][T12949] FS-Cache: N-cookie c=00000000b18e414b [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1400.018346][T12949] FS-Cache: N-cookie d=000000000df64cd0 n=000000007978c103 [ 1400.025619][T12949] FS-Cache: N-key=[10] '0200020000807f000008' [ 1400.119134][T12967] FS-Cache: Duplicate cookie detected [ 1400.124841][T12967] FS-Cache: O-cookie c=000000004c8d0697 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1400.133813][T12967] FS-Cache: O-cookie d=000000000df64cd0 n=00000000904aaecd [ 1400.141037][T12967] FS-Cache: O-key=[10] '0200020000807f000008' [ 1400.147284][T12967] FS-Cache: N-cookie c=00000000a73c04e3 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1400.156012][T12967] FS-Cache: N-cookie d=000000000df64cd0 n=00000000b3f901d0 [ 1400.163347][T12967] FS-Cache: N-key=[10] '0200020000807f000008' 03:44:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000100), 0x0, 0x6) poll(&(0x7f0000000080)=[{r0, 0x8000200}], 0x1, 0x8003) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x0) 03:44:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x101000) 03:44:09 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6a6, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:44:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000040)={0x39e, 0x9, 0xffffffff00000001, 0x100}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000100)=0x1) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f3188b07017c28b958eaa6ed084d849aabbb87e5f6ce05e414a3cab7fa1f2f7aa86e93bbbcf22ef5722b9d2ad977b9c932ba1aa5983dcceb22cd33fb3fd64032a21a29117ff1d98d6a38c5e6ba584") sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000000000041}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="20e1b000000002a02c0300000000000051bf66ede7b300000000000000e8ffffff000000"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000000)=[{r2, 0x180}], 0x30b, 0xedaaec3) [ 1400.433005][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1400.438892][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1400.444806][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1400.450775][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1400.456675][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1400.462457][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:44:10 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x8000a0) 03:44:10 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCSABS0(r1, 0x40044591, 0x0) 03:44:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) syz_genetlink_get_family_id$tipc2(0xfffffffffffffffe) 03:44:10 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x1, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2000c) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) [ 1400.832954][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1400.838875][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1400.943095][T13160] FS-Cache: Duplicate cookie detected [ 1400.948532][T13160] FS-Cache: O-cookie c=000000008adc3730 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1400.957496][T13160] FS-Cache: O-cookie d=000000000df64cd0 n=00000000b0db662a [ 1400.964798][T13160] FS-Cache: O-key=[10] '0200020000807f000008' [ 1400.970932][T13160] FS-Cache: N-cookie c=000000001f30208a [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1400.979709][T13160] FS-Cache: N-cookie d=000000000df64cd0 n=00000000a36c5996 [ 1400.987001][T13160] FS-Cache: N-key=[10] '0200020000807f000008' 03:44:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x8000a0) 03:44:10 executing program 4: 03:44:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x10002) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:44:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xffffffff, &(0x7f0000000000)="0adc1f2addfb9e3188b070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000100)={&(0x7f0000000040)=[0x36e82be0, 0x7f], 0x2, 0x200, 0x8001, 0x7, 0x80000000, 0x5e, {0x80, 0x3, 0x80, 0x4, 0x19, 0x70, 0x18a, 0x4, 0x6, 0x3ff, 0x3, 0x4, 0x8, 0x8, "6a4f5f261f6b122b97e0820fb7c657136182421f7cc2e17a5bf3527309e12f63"}}) 03:44:10 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:10 executing program 4: [ 1401.142761][T13847] FS-Cache: Duplicate cookie detected [ 1401.148434][T13847] FS-Cache: O-cookie c=000000008adc3730 [p=000000007f94dd20 fl=222 nc=0 na=1] [ 1401.157379][T13847] FS-Cache: O-cookie d=000000000df64cd0 n=00000000b0db662a [ 1401.164668][T13847] FS-Cache: O-key=[10] '0200020000807f000008' [ 1401.170839][T13847] FS-Cache: N-cookie c=00000000a4feb043 [p=000000007f94dd20 fl=2 nc=0 na=1] [ 1401.179622][T13847] FS-Cache: N-cookie d=000000000df64cd0 n=000000004a25cccf [ 1401.186897][T13847] FS-Cache: N-key=[10] '0200020000807f000008' 03:44:10 executing program 4: 03:44:11 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x1000000) 03:44:11 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x4b7af565325390ee, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0)={0x0, 0xfffffffffffffffc, 0x3f5, 0x8}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000240)={r1, 0x2f, "4076712e910579e5f527100a85641f608958a7e71c632cfefd4379395c0dbf47437f1014b89891ee01377469cdc7af"}, &(0x7f0000000280)=0x37) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r3 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x6) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r3, 0xc04c5349, &(0x7f0000000100)={0x400, 0xfd6, 0x5}) 03:44:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x4, 0x2) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6) 03:44:11 executing program 3: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000300)={'syz1\x00', {0x80000000, 0x0, 0xbb}, 0x0, [0x4, 0x200, 0x5b, 0x0, 0x0, 0x8000, 0x7, 0x2, 0x101, 0x7241, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0x6, 0xb7, 0x7ff, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x81, 0x0, 0x6, 0x41, 0x5, 0x4, 0x6, 0x0, 0x0, 0x0, 0xd6ae, 0x0, 0x401, 0x0, 0x0, 0xdd4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0xca, 0x0, 0x0, 0xef, 0x2, 0x0, 0xfffffffffffffffb, 0x7ff, 0x7, 0x7ff], [0x0, 0xff, 0x4, 0x5, 0x4, 0x5, 0x8, 0x0, 0xffffffffffffff34, 0x1, 0xf08, 0xfffffffffffffffa, 0x6, 0x5, 0x401, 0x0, 0x8, 0xdc99, 0x4, 0x101, 0x1, 0xad2d, 0x3ff, 0x2, 0x1ff, 0x8, 0x7, 0x0, 0x7, 0x1f, 0x7, 0x6, 0x3f, 0x9, 0x7, 0x1, 0x100000001, 0x7be, 0xaffc, 0x8000, 0x0, 0x1, 0x2, 0x77c, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x9, 0x2, 0x80, 0x0, 0x0, 0x4ffb, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x2a9], [0x8, 0x3f, 0xfffffffffffff001, 0x6, 0x7, 0xff, 0xffffffff, 0x2, 0xff, 0x7, 0x6, 0x7ff, 0xb5e, 0x8, 0x23, 0x3e00000000000000, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0xffffffffffff0fb2, 0x5, 0x1ff, 0x101, 0xb23a, 0x4, 0x0, 0x2, 0x80, 0x5, 0x5, 0x89, 0x40, 0x1f, 0xff, 0x1, 0x0, 0x4, 0x7ff, 0x80000000, 0x2f16, 0x3ce, 0xe2, 0x3, 0x10001, 0x20004000, 0x8, 0x1f, 0x8, 0x5, 0x80, 0x7, 0x8000, 0x8, 0xf4cb, 0x10001, 0x0, 0x3, 0xf87, 0x3, 0x2, 0x7, 0x7, 0x9], [0x7, 0x7e, 0x4, 0x3, 0x5, 0x8, 0x1, 0x2, 0xffffffffffffff81, 0xc640, 0x7ff, 0x0, 0x8, 0xec, 0x2d75, 0x4b95, 0x3, 0x80, 0x4, 0x10001, 0x0, 0x2547, 0x1ff, 0x1, 0x7f, 0xa86a, 0x0, 0xf775, 0xfff, 0x8, 0xcf, 0x8, 0x2, 0x9, 0xffffffffffff7fff, 0x3bb3, 0x8, 0x5, 0x200000000000000, 0xffffffff80000000, 0xb37, 0x400, 0x7fff, 0xfff, 0x12, 0x101, 0x2, 0x5, 0x6, 0x4, 0x100, 0xfe07, 0x1, 0x100000000, 0x8, 0x2, 0xaf3, 0x7f, 0x1000, 0xbbf, 0x514, 0x0, 0x5, 0x100]}, 0x45c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x3, 0x297ef) 03:44:11 executing program 4: [ 1401.673596][ C0] ------------[ cut here ]------------ [ 1401.681046][ C0] ODEBUG: free active (active state 0) object type: timer_list hint: xprt_init_autodisconnect+0x0/0x170 [ 1401.692474][ C0] WARNING: CPU: 0 PID: 14027 at lib/debugobjects.c:325 debug_print_object+0x16a/0x250 [ 1401.702309][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 1401.709114][ C0] CPU: 0 PID: 14027 Comm: syz-executor.0 Not tainted 5.0.0+ #26 [ 1401.717011][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1401.727084][ C0] Call Trace: [ 1401.730373][ C0] [ 1401.733241][ C0] dump_stack+0x172/0x1f0 [ 1401.737610][ C0] ? debug_print_object+0x150/0x250 [ 1401.742917][ C0] panic+0x2cb/0x65c [ 1401.746838][ C0] ? __warn_printk+0xf3/0xf3 [ 1401.751456][ C0] ? debug_print_object+0x16a/0x250 [ 1401.756685][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1401.762946][ C0] ? __warn.cold+0x5/0x45 [ 1401.767309][ C0] ? __warn+0xe8/0x1d0 [ 1401.771394][ C0] ? debug_print_object+0x16a/0x250 [ 1401.776603][ C0] __warn.cold+0x20/0x45 [ 1401.780865][ C0] ? debug_print_object+0x16a/0x250 [ 1401.786086][ C0] report_bug+0x263/0x2b0 [ 1401.790538][ C0] do_error_trap+0x11b/0x200 [ 1401.795162][ C0] do_invalid_op+0x37/0x50 [ 1401.799591][ C0] ? debug_print_object+0x16a/0x250 [ 1401.804806][ C0] invalid_op+0x14/0x20 [ 1401.808977][ C0] RIP: 0010:debug_print_object+0x16a/0x250 [ 1401.814803][ C0] Code: dd 80 e2 a1 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 80 e2 a1 87 48 c7 c7 20 d8 a1 87 e8 24 1a 12 fe <0f> 0b 83 05 51 54 2d 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 1401.834435][ C0] RSP: 0018:ffff8880ae807d08 EFLAGS: 00010086 [ 1401.840522][ C0] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 1401.848502][ C0] RDX: 0000000000000100 RSI: ffffffff815ae266 RDI: ffffed1015d00f93 [ 1401.856480][ C0] RBP: ffff8880ae807d48 R08: ffff888090110400 R09: ffffed1015d03ef1 [ 1401.864476][ C0] R10: ffffed1015d03ef0 R11: ffff8880ae81f787 R12: 0000000000000001 [ 1401.872455][ C0] R13: ffffffff889af600 R14: ffffffff816049b0 R15: ffff888085deed40 [ 1401.880468][ C0] ? __internal_add_timer+0x1f0/0x1f0 [ 1401.885860][ C0] ? vprintk_func+0x86/0x189 [ 1401.890469][ C0] ? debug_print_object+0x16a/0x250 [ 1401.895678][ C0] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1401.901711][ C0] debug_check_no_obj_freed+0x29f/0x464 [ 1401.907277][ C0] kfree+0xbd/0x230 [ 1401.911184][ C0] rcu_core+0xa4b/0x1390 [ 1401.915451][ C0] ? rcu_check_gp_start_stall+0x250/0x250 [ 1401.921189][ C0] __do_softirq+0x266/0x95a [ 1401.925702][ C0] ? sched_clock_cpu+0x1b/0x1b0 [ 1401.930568][ C0] irq_exit+0x180/0x1d0 [ 1401.934765][ C0] smp_apic_timer_interrupt+0x14a/0x570 [ 1401.940334][ C0] apic_timer_interrupt+0xf/0x20 [ 1401.945267][ C0] [ 1401.948216][ C0] RIP: 0010:clear_page_erms+0x7/0x10 [ 1401.953506][ C0] Code: 48 89 47 18 48 89 47 20 48 89 47 28 48 89 47 30 48 89 47 38 48 8d 7f 40 75 d9 90 c3 0f 1f 80 00 00 00 00 b9 00 10 00 00 31 c0 aa c3 90 90 90 90 90 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 [ 1401.973116][ C0] RSP: 0018:ffff88805228fb78 EFLAGS: 00010246 ORIG_RAX: ffffffffffffff13 [ 1401.981546][ C0] RAX: 0000000000000000 RBX: ffff888000000000 RCX: 0000000000000300 [ 1401.989524][ C0] RDX: 1ffff110120222e7 RSI: ffffffff819aa146 RDI: ffff88803bc16d00 [ 1401.997496][ C0] RBP: ffff88805228fb90 R08: ffff888090110400 R09: ffffed1015d05bc8 [ 1402.005557][ C0] R10: ffffed1015d05bc7 R11: ffff8880ae82de3b R12: ffff888090110400 [ 1402.013562][ C0] R13: 0000000000000016 R14: 0000000000000000 R15: 0000000000000000 [ 1402.021559][ C0] ? clear_subpage+0x16/0x110 [ 1402.026255][ C0] ? clear_subpage+0x85/0x110 [ 1402.030942][ C0] clear_huge_page+0xb5/0x4d0 [ 1402.035652][ C0] do_huge_pmd_anonymous_page+0x735/0x1730 [ 1402.041472][ C0] ? do_wp_page+0x5e0/0x16c0 [ 1402.046086][ C0] ? __thp_get_unmapped_area+0x190/0x190 [ 1402.051751][ C0] ? __lock_acquire+0x548/0x3fb0 [ 1402.056711][ C0] __handle_mm_fault+0x2d5e/0x3ec0 [ 1402.061843][ C0] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1402.067493][ C0] ? find_held_lock+0x35/0x130 [ 1402.072269][ C0] ? handle_mm_fault+0x322/0xb30 [ 1402.077221][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1402.083492][ C0] ? kasan_check_read+0x11/0x20 [ 1402.088374][ C0] handle_mm_fault+0x43f/0xb30 [ 1402.093170][ C0] __do_page_fault+0x5ef/0xda0 [ 1402.097952][ C0] do_page_fault+0x71/0x581 [ 1402.102463][ C0] ? page_fault+0x8/0x30 [ 1402.106730][ C0] page_fault+0x1e/0x30 [ 1402.110887][ C0] RIP: 0033:0x43f371 [ 1402.114811][ C0] Code: 8d 15 13 5e 0a 00 8b 0c 8a 8b 04 82 29 c8 c3 66 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e <88> 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e 66 89 0f 48 83 c6 [ 1402.134436][ C0] RSP: 002b:00007ffd801da938 EFLAGS: 00010202 [ 1402.140505][ C0] RAX: 0000000020000040 RBX: 000000000073c900 RCX: 000000000000000a [ 1402.148482][ C0] RDX: 000000000000000b RSI: 0000000000740080 RDI: 0000000020000040 [ 1402.156479][ C0] RBP: 000000000073c900 R08: 000000004cc1c532 R09: 000000004cc1c536 [ 1402.164543][ C0] R10: 00007ffd801daa00 R11: 0000000000000246 R12: fffffffffffffffe [ 1402.172523][ C0] R13: 0000000000156334 R14: 00000000000003e8 R15: 000000000073bf0c [ 1402.180514][ C0] [ 1402.180519][ C0] ====================================================== [ 1402.180525][ C0] WARNING: possible circular locking dependency detected [ 1402.180528][ C0] 5.0.0+ #26 Not tainted [ 1402.180533][ C0] ------------------------------------------------------ [ 1402.180538][ C0] syz-executor.0/14027 is trying to acquire lock: [ 1402.180541][ C0] 0000000077d66a73 ((console_sem).lock){-.-.}, at: down_trylock+0x13/0x70 [ 1402.180554][ C0] [ 1402.180558][ C0] but task is already holding lock: [ 1402.180561][ C0] 0000000085133bd4 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 1402.180575][ C0] [ 1402.180579][ C0] which lock already depends on the new lock. [ 1402.180582][ C0] [ 1402.180584][ C0] [ 1402.180589][ C0] the existing dependency chain (in reverse order) is: [ 1402.180591][ C0] [ 1402.180593][ C0] -> #3 (&obj_hash[i].lock){-.-.}: [ 1402.180606][ C0] lock_acquire+0x16f/0x3f0 [ 1402.180610][ C0] _raw_spin_lock_irqsave+0x95/0xcd [ 1402.180614][ C0] __debug_object_init+0xc6/0xc30 [ 1402.180618][ C0] debug_object_init+0x16/0x20 [ 1402.180622][ C0] hrtimer_init+0x2a/0x300 [ 1402.180626][ C0] init_dl_task_timer+0x1b/0x50 [ 1402.180629][ C0] __sched_fork+0x22a/0x4f0 [ 1402.180633][ C0] init_idle+0x75/0x670 [ 1402.180637][ C0] sched_init+0x952/0x9f5 [ 1402.180640][ C0] start_kernel+0x3d3/0x84f [ 1402.180645][ C0] x86_64_start_reservations+0x29/0x2b [ 1402.180649][ C0] x86_64_start_kernel+0x77/0x7b [ 1402.180653][ C0] secondary_startup_64+0xa4/0xb0 [ 1402.180655][ C0] [ 1402.180657][ C0] -> #2 (&rq->lock){-.-.}: [ 1402.180670][ C0] lock_acquire+0x16f/0x3f0 [ 1402.180673][ C0] _raw_spin_lock+0x2f/0x40 [ 1402.180677][ C0] task_fork_fair+0x6a/0x520 [ 1402.180680][ C0] sched_fork+0x3b2/0x900 [ 1402.180685][ C0] copy_process.part.0+0x188c/0x7980 [ 1402.180688][ C0] _do_fork+0x257/0xfd0 [ 1402.180692][ C0] kernel_thread+0x34/0x40 [ 1402.180695][ C0] rest_init+0x28/0x37b [ 1402.180699][ C0] arch_call_rest_init+0xe/0x1b [ 1402.180703][ C0] start_kernel+0x816/0x84f [ 1402.180707][ C0] x86_64_start_reservations+0x29/0x2b [ 1402.180711][ C0] x86_64_start_kernel+0x77/0x7b [ 1402.180715][ C0] secondary_startup_64+0xa4/0xb0 [ 1402.180717][ C0] [ 1402.180719][ C0] -> #1 (&p->pi_lock){-.-.}: [ 1402.180732][ C0] lock_acquire+0x16f/0x3f0 [ 1402.180736][ C0] _raw_spin_lock_irqsave+0x95/0xcd [ 1402.180740][ C0] try_to_wake_up+0x8f/0x1000 [ 1402.180744][ C0] wake_up_process+0x10/0x20 [ 1402.180747][ C0] __up.isra.0+0x136/0x1a0 [ 1402.180750][ C0] up+0x9c/0xe0 [ 1402.180754][ C0] __up_console_sem+0xb7/0x1c0 [ 1402.180758][ C0] console_unlock+0x681/0xeb0 [ 1402.180761][ C0] vprintk_emit+0x280/0x6d0 [ 1402.180765][ C0] vprintk_default+0x28/0x30 [ 1402.180769][ C0] vprintk_func+0x7e/0x189 [ 1402.180772][ C0] printk+0xba/0xed [ 1402.180776][ C0] do_exit.cold+0x5d/0x254 [ 1402.180779][ C0] do_group_exit+0x135/0x370 [ 1402.180783][ C0] __x64_sys_exit_group+0x44/0x50 [ 1402.180787][ C0] do_syscall_64+0x103/0x610 [ 1402.180801][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1402.180803][ C0] [ 1402.180805][ C0] -> #0 ((console_sem).lock){-.-.}: [ 1402.180818][ C0] __lock_acquire+0x239c/0x3fb0 [ 1402.180822][ C0] lock_acquire+0x16f/0x3f0 [ 1402.180826][ C0] _raw_spin_lock_irqsave+0x95/0xcd [ 1402.180829][ C0] down_trylock+0x13/0x70 [ 1402.180834][ C0] __down_trylock_console_sem+0xa8/0x210 [ 1402.180838][ C0] console_trylock+0x15/0xa0 [ 1402.180841][ C0] vprintk_emit+0x267/0x6d0 [ 1402.180845][ C0] vprintk_default+0x28/0x30 [ 1402.180848][ C0] vprintk_func+0x7e/0x189 [ 1402.180852][ C0] printk+0xba/0xed [ 1402.180855][ C0] __warn_printk+0x9b/0xf3 [ 1402.180860][ C0] debug_print_object+0x16a/0x250 [ 1402.180864][ C0] debug_check_no_obj_freed+0x29f/0x464 [ 1402.180867][ C0] kfree+0xbd/0x230 [ 1402.180870][ C0] rcu_core+0xa4b/0x1390 [ 1402.180874][ C0] __do_softirq+0x266/0x95a [ 1402.180878][ C0] irq_exit+0x180/0x1d0 [ 1402.180882][ C0] smp_apic_timer_interrupt+0x14a/0x570 [ 1402.180886][ C0] apic_timer_interrupt+0xf/0x20 [ 1402.180890][ C0] clear_page_erms+0x7/0x10 [ 1402.180893][ C0] clear_huge_page+0xb5/0x4d0 [ 1402.180898][ C0] do_huge_pmd_anonymous_page+0x735/0x1730 [ 1402.180902][ C0] __handle_mm_fault+0x2d5e/0x3ec0 [ 1402.180906][ C0] handle_mm_fault+0x43f/0xb30 [ 1402.180909][ C0] __do_page_fault+0x5ef/0xda0 [ 1402.180913][ C0] do_page_fault+0x71/0x581 [ 1402.180917][ C0] page_fault+0x1e/0x30 [ 1402.180919][ C0] [ 1402.180923][ C0] other info that might help us debug this: [ 1402.180925][ C0] [ 1402.180928][ C0] Chain exists of: [ 1402.180930][ C0] (console_sem).lock --> &rq->lock --> &obj_hash[i].lock [ 1402.180947][ C0] [ 1402.180951][ C0] Possible unsafe locking scenario: [ 1402.180953][ C0] [ 1402.180957][ C0] CPU0 CPU1 [ 1402.180961][ C0] ---- ---- [ 1402.180963][ C0] lock(&obj_hash[i].lock); [ 1402.180972][ C0] lock(&rq->lock); [ 1402.180980][ C0] lock(&obj_hash[i].lock); [ 1402.180988][ C0] lock((console_sem).lock); [ 1402.180996][ C0] [ 1402.180999][ C0] *** DEADLOCK *** [ 1402.181001][ C0] [ 1402.181005][ C0] 3 locks held by syz-executor.0/14027: [ 1402.181007][ C0] #0: 000000009f2a220e (&mm->mmap_sem){++++}, at: __do_page_fault+0x337/0xda0 [ 1402.181023][ C0] #1: 00000000ead7394f (rcu_callback){....}, at: rcu_core+0xa0d/0x1390 [ 1402.181038][ C0] #2: 0000000085133bd4 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 1402.181060][ C0] [ 1402.181063][ C0] stack backtrace: [ 1402.181068][ C0] CPU: 0 PID: 14027 Comm: syz-executor.0 Not tainted 5.0.0+ #26 [ 1402.181074][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1402.181077][ C0] Call Trace: [ 1402.181080][ C0] [ 1402.181083][ C0] dump_stack+0x172/0x1f0 [ 1402.181087][ C0] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 1402.181091][ C0] check_prev_add.constprop.0+0xf11/0x23c0 [ 1402.181095][ C0] ? check_usage+0x570/0x570 [ 1402.181099][ C0] ? check_prev_add.constprop.0+0x8c7/0x23c0 [ 1402.181103][ C0] ? __lockdep_reset_lock+0x450/0x450 [ 1402.181108][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1402.181111][ C0] ? find_first_zero_bit+0x9a/0xc0 [ 1402.181115][ C0] __lock_acquire+0x239c/0x3fb0 [ 1402.181119][ C0] ? __lockdep_reset_lock+0x450/0x450 [ 1402.181123][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1402.181127][ C0] ? mark_held_locks+0xf0/0xf0 [ 1402.181130][ C0] ? kvm_clock_read+0x18/0x30 [ 1402.181134][ C0] ? kvm_sched_clock_read+0x9/0x20 [ 1402.181137][ C0] lock_acquire+0x16f/0x3f0 [ 1402.181141][ C0] ? down_trylock+0x13/0x70 [ 1402.181145][ C0] _raw_spin_lock_irqsave+0x95/0xcd [ 1402.181148][ C0] ? down_trylock+0x13/0x70 [ 1402.181151][ C0] ? vprintk_emit+0x267/0x6d0 [ 1402.181155][ C0] down_trylock+0x13/0x70 [ 1402.181158][ C0] ? vprintk_emit+0x267/0x6d0 [ 1402.181162][ C0] __down_trylock_console_sem+0xa8/0x210 [ 1402.181166][ C0] console_trylock+0x15/0xa0 [ 1402.181169][ C0] vprintk_emit+0x267/0x6d0 [ 1402.181173][ C0] ? __internal_add_timer+0x1f0/0x1f0 [ 1402.181176][ C0] vprintk_default+0x28/0x30 [ 1402.181180][ C0] vprintk_func+0x7e/0x189 [ 1402.181183][ C0] printk+0xba/0xed [ 1402.181187][ C0] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1402.181190][ C0] ? __warn_printk+0x8f/0xf3 [ 1402.181194][ C0] ? xprt_register_transport+0x140/0x140 [ 1402.181198][ C0] __warn_printk+0x9b/0xf3 [ 1402.181201][ C0] ? add_taint.cold+0x16/0x16 [ 1402.181205][ C0] ? kasan_check_write+0x14/0x20 [ 1402.181209][ C0] ? lock_downgrade+0x880/0x880 [ 1402.181213][ C0] ? xprt_register_transport+0x140/0x140 [ 1402.181217][ C0] debug_print_object+0x16a/0x250 [ 1402.181221][ C0] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1402.181225][ C0] debug_check_no_obj_freed+0x29f/0x464 [ 1402.181228][ C0] kfree+0xbd/0x230 [ 1402.181231][ C0] rcu_core+0xa4b/0x1390 [ 1402.181235][ C0] ? rcu_check_gp_start_stall+0x250/0x250 [ 1402.181239][ C0] __do_softirq+0x266/0x95a [ 1402.181242][ C0] ? sched_clock_cpu+0x1b/0x1b0 [ 1402.181245][ C0] irq_exit+0x180/0x1d0 [ 1402.181249][ C0] smp_apic_timer_interrupt+0x14a/0x570 [ 1402.181253][ C0] apic_timer_interrupt+0xf/0x20 [ 1402.181256][ C0] [ 1402.181259][ C0] RIP: 0010:clear_page_erms+0x7/0x10 [ 1402.181271][ C0] Code: 48 89 47 18 48 89 47 20 48 89 47 28 48 89 47 30 48 89 47 38 48 8d 7f 40 75 d9 90 c3 0f 1f 80 00 00 00 00 b9 00 10 00 00 31 c0 aa c3 90 90 90 90 90 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 [ 1402.181275][ C0] RSP: 0018:ffff88805228fb78 EFLAGS: 00010246 ORIG_RAX: ffffffffffffff13 [ 1402.181284][ C0] RAX: 0000000000000000 RBX: ffff888000000000 RCX: 0000000000000300 [ 1402.181290][ C0] RDX: 1ffff110120222e7 RSI: ffffffff819aa146 RDI: ffff88803bc16d00 [ 1402.181295][ C0] RBP: ffff88805228fb90 R08: ffff888090110400 R09: ffffed1015d05bc8 [ 1402.181301][ C0] R10: ffffed1015d05bc7 R11: ffff8880ae82de3b R12: ffff888090110400 [ 1402.181306][ C0] R13: 0000000000000016 R14: 0000000000000000 R15: 0000000000000000 [ 1402.181309][ C0] ? clear_subpage+0x16/0x110 [ 1402.181313][ C0] ? clear_subpage+0x85/0x110 [ 1402.181317][ C0] clear_huge_page+0xb5/0x4d0 [ 1402.181321][ C0] do_huge_pmd_anonymous_page+0x735/0x1730 [ 1402.181324][ C0] ? do_wp_page+0x5e0/0x16c0 [ 1402.181328][ C0] ? __thp_get_unmapped_area+0x190/0x190 [ 1402.181332][ C0] ? __lock_acquire+0x548/0x3fb0 [ 1402.181335][ C0] __handle_mm_fault+0x2d5e/0x3ec0 [ 1402.181339][ C0] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1402.181343][ C0] ? find_held_lock+0x35/0x130 [ 1402.181346][ C0] ? handle_mm_fault+0x322/0xb30 [ 1402.181351][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1402.181354][ C0] ? kasan_check_read+0x11/0x20 [ 1402.181358][ C0] handle_mm_fault+0x43f/0xb30 [ 1402.181361][ C0] __do_page_fault+0x5ef/0xda0 [ 1402.181365][ C0] do_page_fault+0x71/0x581 [ 1402.181368][ C0] ? page_fault+0x8/0x30 [ 1402.181371][ C0] page_fault+0x1e/0x30 [ 1402.181374][ C0] RIP: 0033:0x43f371 [ 1402.181386][ C0] Code: 8d 15 13 5e 0a 00 8b 0c 8a 8b 04 82 29 c8 c3 66 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e <88> 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e 66 89 0f 48 83 c6 [ 1402.181390][ C0] RSP: 002b:00007ffd801da938 EFLAGS: 00010202 [ 1402.181398][ C0] RAX: 0000000020000040 RBX: 000000000073c900 RCX: 000000000000000a [ 1402.181403][ C0] RDX: 000000000000000b RSI: 0000000000740080 RDI: 0000000020000040 [ 1402.181408][ C0] RBP: 000000000073c900 R08: 000000004cc1c532 R09: 000000004cc1c536 [ 1402.181414][ C0] R10: 00007ffd801daa00 R11: 0000000000000246 R12: fffffffffffffffe [ 1402.181419][ C0] R13: 0000000000156334 R14: 00000000000003e8 R15: 000000000073bf0c [ 1402.182263][ C0] Kernel Offset: disabled [ 1403.281670][ C0] Rebooting in 86400 seconds..