00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xfdfdffff00000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='net/bnep\x00') sendfile(r1, r0, 0x0, 0x7fff) 17:24:30 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1800400, 0x4a}) 17:24:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000200)=ANY=[@ANYBLOB="cb61da07001631becf03ea4e86f04e9ee42b9ffd32f7ab7ee40c5b221f44c8bf0b4229be94aabdf666fecc18ee75e686fdf8a302b755b10f16809c47d91da727786e0322feea466274754e419dccaeba0000000000"]) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 17:24:30 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x180020000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000740)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xeff\x1c\xb8\xed\xbe2hg\xc9\xd2|\xc9\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\xadV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x7fff) 17:24:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c5628693232faa7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:30 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x1800200}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:30 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x280040000000000, 0x4a}) 17:24:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c5628693232fba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:30 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') fcntl$getown(r0, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7fff) 17:24:30 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2, 0x4a}) 17:24:30 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x938c0000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:30 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x900000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000100)=ANY=[@ANYBLOB="cb9de4073f808207e9e78fdbb1c72a1f46f49c47fa3df8567797fc7cdddc690761d44f21b76c57b360b2f7d496a83ccb8c200892b95df2e947ad4224913bdb6d58058d8ca3a9bf2498497956730a91423217af49b2f77008d51146279a130a2a846f68f3cafc40824fc07e38"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000200)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r4, 0xc1105517, &(0x7f0000000300)={{0x0, 0x4, 0x401, 0xfffffffffffff686, '\x00', 0x8}, 0x0, 0x8, 0x80000, r5, 0x2, 0x80, 'syz0\x00', &(0x7f0000000180)=['/dev/kvm\x00', 'securityvboxnet1,\x00'], 0x1b, [], [0x8, 0x5, 0x2, 0x202]}) 17:24:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r2, r0, 0x0, 0x7fff) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x5, 0x3, 0x5}, &(0x7f0000000080)=0x10) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r4, r1, 0x0, 0x8, &(0x7f0000000140)='oom_adj\x00'}, 0x30) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYBLOB="a4277436"], 0xa) 17:24:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324bfae680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:31 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xc88000000000000, 0x4a}) 17:24:31 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x800000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324bfbe680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:31 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x38001}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x8003) 17:24:31 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xbd84020000000000, 0x4a}) 17:24:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) getsockname$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000080)=0x6e) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7fb80129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) close(r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x7fff) 17:24:31 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xfdfdffff00000000, 0x4a}) 17:24:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000000)=""/56) r2 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r2, r0, 0x0, 0x7fff) 17:24:31 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xfbbf0000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7fa80129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:31 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x700000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="53c9"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:31 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x180000000000000, 0x4a}) 17:24:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x7fff) pread64(r1, &(0x7f0000000080)=""/173, 0xfffffe43, 0x0) 17:24:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e6fa129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:31 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x39640200}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:31 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x12000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') signalfd4(r1, &(0x7f0000000000)={0xffffffff}, 0x8, 0x800) r2 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r2, r0, 0x0, 0x7fff) 17:24:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e6fb129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:31 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xd9580200, 0x4a}) 17:24:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000100)=0x7) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:24:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680fa9643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r0, r2, 0x0, 0x7) 17:24:31 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x860300}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:31 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x800000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680fb9643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:32 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xd00, 0x4a}) 17:24:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000002bc0)={0x0, @in6={{0xa, 0x4e21, 0x7, @ipv4={[], [], @local}}}, [0x6, 0x7, 0xffffffffffffffc1, 0x6, 0x1ce, 0x0, 0xffffffff, 0x8000, 0x4, 0x8, 0xfffffffffffffffa, 0x1, 0x1000, 0x7, 0x1f]}, &(0x7f0000002cc0)=0x100) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000002d00)={0x0, 0x7, 0xfffffffffffffffa, 0x274c, 0x6, 0x7, 0x8000, 0x1, {0x0, @in={{0x2, 0x4e21, @empty}}, 0x8, 0x6, 0x10000000000000, 0x1, 0x4}}, &(0x7f0000002dc0)=0xb0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000002e00)=@assoc_value={0x0}, &(0x7f0000002e40)=0x8) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000045c0)=@assoc_value={0x0}, &(0x7f0000004600)=0x8) sendmmsg$inet_sctp(r1, &(0x7f0000004b40)=[{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x101, @ipv4={[], [], @multicast1}}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000080)="430b9b35261d7ca53105887af264631c9c442cbfeed8ecfb36d10ddddee11d7b324aba26dbb29e7199a428348a4d5a2fcf0a1a5cb605ce", 0x37}, {&(0x7f0000000740)="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", 0x1000}], 0x2, &(0x7f0000000100)=[@dstaddrv4={0x18, 0x84, 0x7, @empty}, @dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0xb}}, @authinfo={0x18, 0x84, 0x6, {0xcb}}, @dstaddrv4={0x18, 0x84, 0x7, @broadcast}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x2}}], 0x78, 0xc000}, {&(0x7f0000000180)=@in={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="d35eb39a2fb09cc9b65c306ebd1183fef922610918b7f969fb2866840b26e1b6a06f0cbc5ab59e2836046356e79c77f43c60cafbe096a7b76367d90eb49ccfd7d8c49190034143ce13f40a1f325491f8fb50a78d0f80d00f55184e73a6514f3103c66e1c5f45a2e16a498bea89612fe95a87311ca45e05d11a3b0140583cae097e8406d64e056607b6ec8d6accd6b955566772b9ba7363a0608325dc356acb6936164db0612c653c3f30ffcb65e2dd739c7c2724189bdbc77f5669fc55c698e356a0764a66f8ffe5c513d86ba5", 0xcd}, {&(0x7f00000002c0)="9c56ec03f4baeccb4f6c38032a1af3dae9ca0615266c46a8750d2f58bbf9b0aeb2e90a179dd78dea6f9793a6d2168457908fa2bd1e1c2a5cf3d3feadbe63b1", 0x3f}, {&(0x7f0000001740)="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", 0x1000}, {&(0x7f0000000300)="6c1f56734cf4308dab4c0edb9e0c156c16dbaff47df8b1ceb12efa014d1ca6298432f18186e26bb2ec79c1efbc8250bfdb3b3c4bd364c5f56efa11f7aaccc6c270f9c24bc2e953a2bdb48590b1c5150875fc55580c63915d7a34668249ebb65e55733dab26729ce07f8842c56af46af054c72861076d8f9f79363e65cac0c8566e64cd3bbc31af02080700995c74fbf4fa273a556ec33ec2a75cbdac990fe5baf912535f3d2377cf8e422c498234fe8abf79d72e", 0xb4}, {&(0x7f00000003c0)="c9b236172adbc726ee4503000fd1f8ab5a45f97075108809fb9adaa6310455cb6f080ba77dfe6e3fbf725fe6bbadb621896b3aab86c5b38f9ea046ad8de1072e38ad0e45e2594054aeee26b785b22a79c569442e2d874d7b3553a404f68a537ac4845b9841a27f8fb48c7a4b844fdda97c63fe687cc57496ac742b93006917ec2b75117c822fab563e1431a1fe3d24b23e6934c6f8b350829c54451759", 0x9d}, {&(0x7f0000000480)="cebff768a258ae53d59115682d4b8494c4e9d87bcd112d597593aa9f1882c1422ca22cd200c7d78cbabdd934008ffb7db6690216650b4c900828f53610e77d44965e4045921291c14fd7d5fe595b179f5450f8b8b92c2349338aa1c0ad88d9321fadc1f9715ba022517e1d94db275cf19708", 0x72}, {&(0x7f0000002740)="5a4d6b0340563a3788c8d11eb9b28b62234838e13a4e311a2b7d4584fcd31120ce94f72fa100f120282ed519372ce287008c79ee335e6732ed436f0615a35a3045defef50204b3329a6c2a21a68cea4c47ea43ef37f6db4e283d19742f92e7d1112cfb55d4af0576f652da35867d58249fab5e1539ccdd1fb071bd5047b83bd0c488085c07af70ac9b5be4e15b5a6a", 0x8f}, {&(0x7f0000002800)="05eebcaab9644dae121d1acdd307af6e1a6ab1410ae526fc5346f3e4d9c9e9b757dda7852c25fbed742fa5631b8e82189668f6fa25076454f1ecb17bfac131d20f0102eb40f8f93a20024be4d1f658279a374c2d2e0abced751a88b67b02a4e2819ea7c74ce71f25b9b1a8ef866366c6917719a77f9c49b6fc6bcd47338d4f23a4da670d91f76937cad925b94ce8d71f3d320975a3a0dd6a40ede1b980ab30b44ff142f5602e44a0fd635b647664bcfe1639680b8d45838b0d223c2cce35f76ccc43f90213852a46c6701a1601fbd451e6ddc9de27dfa4f3ac227fd70fe64050ec6eb4bb6bb22c17db466f31031dd82f", 0xf0}], 0x8, 0x0, 0x0, 0x9f015659fb20f137}, {&(0x7f0000002900)=@in={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000002b80)=[{&(0x7f0000002940)="214d258a88f26e37265893c0a043b8c7729779b30f", 0x15}, {&(0x7f0000002980)="22a6e4fdc559c3cf78b6445b619f3d8064cb083b85963de719ea4021e64b39d956aa9a97f9632c17935a217773ad12b46f63461944be7d6c09dffab48729", 0x3e}, {&(0x7f00000029c0)="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", 0xfd}, {&(0x7f0000002ac0)="2b0d007d926c8f8a23adcdbb3698bf16ae6d579a8176e297a542ccce6d4487db009a756cdbbc1d91f6bff9097367d15b764975560c6388b31de067a6de11e9e12db70f9618b495b0190deb61a48615d0ba4136128bed2c984747619c188f50178fa1dfeac10dc128689aabb93c9897566a3cd699316a9edff05d248e0b4c273cd81b2c2aa3d318d58a396f8f5044813f3c96cf9bd6bd9dd75962763d2893ca28c283", 0xa2}], 0x4, &(0x7f0000004d40)=ANY=[@ANYBLOB="200000000000000084000000020000000300048009000000d3f0ffff", @ANYRES32=r3, @ANYBLOB="180000000000000084000000060d63ac53226300000081004d7fbba2b76a000000000000200000000000000084000d0002000000ffff0900310084bd05a896a2ceb3fbd64390c319", @ANYRES32=r5, @ANYBLOB="18000000000000008400000000000000ee000200060007002000000000000000840000000200000009000100ff0f000001000000", @ANYRES32=r6], 0x90, 0x10}, {&(0x7f0000002f40)=@in6={0xa, 0x4e20, 0x0, @mcast2, 0x6}, 0x1c, &(0x7f0000003200)=[{&(0x7f0000002f80)="d6e94d7117c2fdf01c5fee8f567da3059b58c7e93b64aa4e14f9b59e3aa718fa6f7750ab1d8411d44335f10e60bc1ee1a7372e4f0d", 0x35}, {&(0x7f0000002fc0)="22bfa4fa78c40796814f655cdde5c407b2bce520ee5cfc56edcd7982a4b7a98346ebca965612a6fb36aa4f0a521985831cd70052d797921ce599602e85b3cf34ac5b29c48d3aa20fe1217788caadc56732ae74091c26837445cd571b393353f1e700d6435c6aafb655db00ecfe61c68a902f1c0ef047b9acf5e5b57be77552cda6ab1b0c515a3401ba4edb572a541eb9", 0x90}, {&(0x7f0000003080)="56efbc7fecc3761f8feeb25cb90b459aafe7c59ebf5c25369c895553aabd92b81ca10a49f1e582ceb1b254995495681966187f23ed05100686a845d0f88f7a8a880b8749748f395f8a9aaa8d25b29f2ec3af8b5c099213427e5e3e2536d49de4be3b0cb7d01d5a553f606bc464dd7e44ae2a77139233851339fa2e1f4981", 0x7e}, {&(0x7f0000003100)="ae35f1fb52fb88ad214e74b54f657e82c1c2e3e1cb1d0533dad54c4475cbdd6f176cc30d9224e75f0d1723bf3d39672e6e8277f03a5dd6de35ee773f6a98096cfae719c813b8debacb3e682b62dee024676d151c504771c32727dba7d52321e1ed1f3fb7896d81452f4b1f42809e72f591143e9d808b3aca3379f6a0f6eda6e91fd617a9ab88e3f15d7bd85fd6dc722ef7cb5c097710410e5b049ac319e2c648410b24bac53fb03190b86e395176769d4d99e24e3eba8c321a9ecd8c600ba1bf05682064ddfb96d49092f8663fd3de59db5f037832830f82973b2631e077c5e6a0467fe7947560ff3ab3927b18570e84694d02", 0xf3}], 0x4, &(0x7f0000003240)=ANY=[@ANYBLOB="180000000000000084000000070000009000000000000000180000000000000084000000000000004000010009004000180040000000000084000000060000000400000000000000"], 0x48, 0x24000800}, {&(0x7f00000032c0)=@in={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000004580)=[{&(0x7f0000003300)="171630673284e2cf05e41fec67f42e48c7eb8c641e2869ade43aef7e9afe0f938231017e9b187915bba08f461be747fecf8163c403e9c9c9167ad1ab22929fb978f4931a7661d878d45eb4ce3b1981f04a8d24302336e1b9bf7d03aea3fb1fb23423c2e5f8cb2210ad", 0x69}, {&(0x7f0000003380)="0a0e4be68e547b40a1d7cf2b7b41aff682c4ef2523b2f1c17996c52bae935643fe696e8567e50745d833f43673a76d6c73377c18f319396adbb3b952c029af4c653cbd29ce165a4cc7ee5213fd35f4f431767b26acab3e05dc0ccb11ea548e5e500ed174af8fb23ee85f48f1b3b14acdbd796b7f0b6fdc2ff7f92eb186595aab117d8ff69f87e9c1fb01442b074bfd44f2304301a4605c6f59927c11657fbdbbf8fe23e8a524ce01848cda222f70a884c9e538dc723ffe1e97a43ba3a712593900f9340241b823fdd097a12736091445958166c9c09165459021effda4ebc71621ed", 0xe2}, {&(0x7f0000003480)="e4b8a1ad9a493786eb82730c7581af5ecc04146a810dc0efadf543183b058cad1c3d8af9b1a9dddbec074d44e9ee704dfc6a9790e9489253a31d56cba5e5d11342f2a94ae7180b5afab299c49cdc63167b24a4c6636dbe6aed9e0d6361de6537c930e3156396aaaf3b010f2242aeeb219a7264c4d730606f02cfb70e143cc368b7d0f9cb1bbcfda2a3c3c7afc6856fc14972007da3eb7a0b527ed72dc91b2a847490410cf38f03421851c0eae45ce9d1ff8b61f37f10c7c243712e2569f62aa1eae04404cff37b4c191139d4500ca751f2", 0xd1}, {&(0x7f0000003580)="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", 0x1000}], 0x4, &(0x7f0000004640)=[@sndrcv={0x30, 0x84, 0x1, {0x5, 0x100, 0x3, 0x5, 0x3, 0x81, 0x7fff, 0x8, r7}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}], 0x48, 0x41}, {&(0x7f00000046c0)=@in={0x2, 0x4e22, @local}, 0x10, &(0x7f0000004b00)=[{&(0x7f0000004700)="08864f831b23d9620a7a45adfd02f9914e6b6360659d5fb7d602dcd7aa4c131d80b7d02904924288fe7ac18523a4f428f176bcbb6d81ff43408ab51aca03adaeba9b8b39222ff096f48d1237df62566536fb1e9c0c3823534f067db40932315601a9856a511716d6c3ae2b68c274a5fcc059cf6809ac0ce8b427f7707a78ebf6c04231902e7268d3ed6da4aae310969b67509b062c4e33637f8be0cbd71253b25e67cf737637761df19d85f4dd61a40cce95392fcb4b1a40de02dc128777a5d190d0bf410bcd03d8ded715866a0978affe96e8059a3a9e8edc3374677038f2954894432dd3ea19c3f3eeaee8809e56b7d9", 0xf1}, {&(0x7f0000004800)="06b93b48ba07b74661b9a3fa005105173ffd805b77325f4332acd8880ee5548ca8ed43bfbd8268f0ca1bf6b41dc5ab8414c2490c3ee5f205b040ee788383f32d2e53422e40e50988fc672f22231558837488f528d75680011ec74e10f47f1798184bca65672ef08f2e12b37f7ef3f3a4cfb8d5cb54ff4cb273b0864b0f04e90375377c47d23133988ae4ca52476d28a87ef467bf51d88a5cd414353d66462bcbf593d95788651a076cadad461c9d479dfe27372244688a8e651880ae2c1d67ded47ade37d19bfca13137e4f0a53a3e2d44232d27022715c32ce94511bd1bf61ef0f2527dadf6d2ef76", 0xe9}, {&(0x7f0000004900)="f25db4fe675ec080339dc367d36414f46b9c7a23cebf3533734c454795290b8e58dc1a701618f47dfe236105ce7eb793f8992b0a5a9277bbab1d9bc9d46034672e49c38cf7caf565b1a1880896fd4323489f7d92ff2462de56ff8590759afbc39e0ae2793e6c4b14d2cfdde39a334805fe2dde8726ac6993fdc45e5c034eb95796440233bbf1add4dfacdbee9128a401eae15458422e6fabcd31d6f6fe87cd0603e02eed96b7c07bc193b7563d7e0cbcc9042896297d37a84906f3545f82c2efd8f1804efbe62acde59b9dfa6ac313e3413b3954d6227a8629c21d94c1976f8158b1", 0xe2}, {&(0x7f0000004a00)="ea50a1e5fc03bf16d634a54975a348d9510ce14efa97903c17e00654efac249159c540eb51a0b5ff0d05c6338e64e04d9bc13f0b13699a7a2717735c3b0ff05b45dd27d1f84022a93936d924910be5bb3158d280da35e97d74504763b8db36d75e6a5692c0a405d24d0f32fe174f5dc79559d1992609f94088938cb88bcd507d18e755cd04e8052fcc52d4abc3f4e93379b4061b8a163e9c3d2e485604451d84a708e1c65c089009dcd7c73cebd1ab21ffb16a57479ca60988dcc2c79566691a8b3aae91c0378637edff518af60d5c41d8e60060ca1cb4be6ca12fd122889d1e1ea50effca08111bae92b76ff0899899c54b91fcd52a", 0xf6}], 0x4, 0x0, 0x0, 0x40000}], 0x6, 0x4000) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000002e80)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000002ec0)={0x103fe, 0x1, 0x4000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000002f00)='/proc/self/net/pfkey\x00', 0x80000, 0x0) sendfile(r2, r2, 0x0, 0x7fff) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000004cc0)={0xfff, 0x1, 0x5, 0x3, r4}, &(0x7f0000004d00)=0x10) 17:24:32 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x8380, 0x4a}) 17:24:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') ioctl$VT_WAITACTIVE(r1, 0x5607) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cpuset\x00') setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000000)={&(0x7f0000000080)=""/97, 0x1132000, 0x7fd, 0x10003}, 0x18) ioctl$RTC_UIE_ON(r1, 0x7003) sendfile(r2, r0, 0x0, 0x7fff) 17:24:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e68012fa43c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:32 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x5000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000100)={0x100000001, {{0x2, 0x4e21, @rand_addr=0x3}}}, 0x88) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:32 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x180040000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:32 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xff7f000000000000, 0x4a}) 17:24:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e68012fb43c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x7fff) 17:24:32 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xe00}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r2, r0, 0x0, 0x7fff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r1, 0x6, 0x1, 0x200, &(0x7f0000000000)=[0x0], 0x1}, 0x20) 17:24:32 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x938c, 0x4a}) 17:24:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e6801296fac218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:32 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x10}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:32 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x280030000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000), 0x4) close(r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x7fff) 17:24:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000100)={0x4, 0x2, 'client0\x00', 0x2, "fab19a0c4341f680", "3a03f8b6601d9d704747390e7a4d79d656040ee560052aac42b6579ba09c5d3d", 0xffffffff, 0x32000000}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(r4, 0xc008aeb0, &(0x7f0000000280)=ANY=[@ANYRES16=r2]) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:24:33 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x21, 0x4a}) 17:24:33 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x180000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:33 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x7fff) 17:24:33 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x1860000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e6801296fbc218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f00000000c0)={0x10}) capset(0x0, 0x0) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) close(r0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x301000, 0x0) ioctl$VIDIOC_ENUM_FMT(r4, 0xc0405602, &(0x7f00000001c0)={0x45b, 0x7, 0x1, "f6b765147f3cbcaaef3b5afa778d5f660c590d9b34dfbdb8e6fe1a53f574a367", 0x31424752}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x1, 0x0, 0xff}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={r5, @in={{0x2, 0x4e23, @remote}}, 0x1, 0x9}, 0x90) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r6, r0, 0x0, 0x7fff) 17:24:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643fa18fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:33 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2660f, 0x4a}) 17:24:33 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x180040000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:33 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x2800400}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) [ 2482.352608] audit: type=1804 audit(1545413073.425:1046): pid=2398 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir034099010/syzkaller.EfFvU8/3632/bus" dev="sda1" ino=16829 res=1 [ 2482.382431] EXT4-fs warning (device sda1): verify_group_input:123: Last group not full 17:24:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') getpgrp(0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000740)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r3, r0, 0x0, 0x7fff) 17:24:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x4000000004000000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3, 0x20000) getsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000280)={@remote, 0x0}, &(0x7f0000000380)=0x14) lsetxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.selinux\x00', &(0x7f00000005c0)='system_u:object_r:crack_exec_t:s0\x00', 0x22, 0x0) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000003c0)={r5, @dev={0xac, 0x14, 0x14, 0xe}, @multicast1}, 0xc) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r4, 0x80045530, &(0x7f0000000100)=""/70) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000240)=ANY=[@ANYBLOB="c512002ec4265bdf07f59789e96b9fff0b39a018043a6f3f7504000000008b"]) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f0000000400)={{0x100000, 0x100000, 0x0, 0x5, 0x80, 0x100, 0x800, 0xea, 0x40, 0x8, 0xff, 0x4}, {0x5000, 0xf006, 0x4, 0x8, 0x7, 0x8000, 0xffff, 0xffffffffffffff00, 0x200000, 0x80, 0x0, 0x241}, {0x0, 0xf000, 0xc, 0x2, 0xfffffffffffff154, 0x4, 0x2, 0x1, 0x3, 0x8, 0xffffffff, 0x58b}, {0x1000, 0xd000, 0xb, 0x5, 0x2, 0x4, 0x4, 0x1, 0x2b7, 0x1, 0xffffffff, 0x3}, {0x1, 0xf000, 0x0, 0x1, 0x1ff, 0x6, 0x7, 0x7fffffff, 0x100000000, 0x3, 0x6, 0x7f}, {0xd000, 0x1, 0xd, 0x7, 0x8, 0x100, 0x0, 0x7, 0xec, 0xa82, 0x1, 0xec41}, {0x4000, 0x17004, 0xc, 0x4, 0x3f, 0x800000, 0x2, 0x80, 0x4, 0x1294, 0x3, 0x2}, {0x2, 0xd000, 0x9, 0x4, 0x2, 0x9, 0x7fff, 0x5, 0xa74, 0x8000, 0x69, 0xb8a}, {0x3000}, {0x4001, 0x4000}, 0x40040004, 0x0, 0xf000, 0x1, 0x6, 0x6401, 0x16001, [0xffffffffffffcb1a, 0x4, 0x8, 0x101]}) getsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x1f, 0x7, 0x5}, &(0x7f0000000300)=0x10) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={r6, 0x792}, 0x8) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video0\x00', 0x2, 0x0) mbind(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4000, &(0x7f0000000600)=0x1f, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000000040)='./file0\x00', 0x40) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x1a5) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:33 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x484, 0x4a}) 17:24:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643fb18fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x7fff) 17:24:33 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x2800300}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="f6650168b6660cadd736ec52e22611ffad933cf1dc407e27e5495bd35c2ae573ded625ad8ad202111eecda19652980d6d45938dba2"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:33 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xfffe070000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c2fafe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:33 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x938c000000000000, 0x4a}) 17:24:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:24:33 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x5000000, 0x4a}) 17:24:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c2fbfe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:34 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x1800200}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(r3, 0xc008aeb0, &(0x7f0000000000)=ANY=[]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fefaa2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:24:34 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x600, 0x4a}) 17:24:34 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xff070000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fefba2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:34 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x28000, 0x4a}) 17:24:34 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x938c000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:24:34 executing program 4: socketpair$unix(0x1, 0xa, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:34 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xa000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59fae04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:24:34 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x500000000000000, 0x4a}) 17:24:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59fbe04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:34 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x26439}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:34 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x300}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2fa4a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) dup2(r0, 0xffffffffffffffff) 17:24:34 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x180010000000000, 0x4a}) 17:24:34 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x2}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r1) 17:24:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2fb4a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:35 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x3000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:35 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x39640200, 0x4a}) 17:24:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x101000, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r1, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 17:24:35 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xbd65020000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e0fa03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:35 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xff7e, 0x4a}) 17:24:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r2) 17:24:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000100)={0x55, 0x4, 0x8000}, 0x4) lstat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r1, 0x400454cc, r6) ioctl$KVM_NMI(r4, 0xae9a) connect$bt_sco(r5, &(0x7f0000001300)={0x1f, {0x8001, 0x9, 0x800, 0x7f, 0x1, 0x8}}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'user.', '\\}\x00'}, &(0x7f0000000300)=""/4096, 0x1000) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:24:35 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1800200, 0x4a}) 17:24:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:24:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e0fb03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:35 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x284bd}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:35 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x1000000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04afaca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:35 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1200, 0x4a}) 17:24:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:24:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04afbca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:35 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x26439, 0x4a}) 17:24:35 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x384}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = dup2(r0, 0xffffffffffffff9c) getsockname$llc(r2, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x10) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000140)=ANY=[@ANYBLOB="bce9b6fefec8f3585a2d2259f347700dec9d5ca1293b7299740c4d00091961c1b6396c67769f9c49aaf716ff52aa1a6032b4addc3a051b751a416316b0feb6d6f38603fc21525151464641f07b6fb23f578a83d927fd027de7"]) ioctl$KVM_NMI(r5, 0xae9a) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 17:24:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:24:35 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x80010000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a05ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:35 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xfbbf000000000000, 0x4a}) 17:24:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a02ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:36 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(0xffffffffffffffff, r2) 17:24:36 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x180010000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:36 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xffffffff00000000, 0x4a}) 17:24:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03fa8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESDEC=r1, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYBLOB="26cad35f6b1192b69f6554f26a1203424d53381574b7d5409c9e2d32347d075929be8462d9b0984f888df9cb1b317014aff9ef686eccbe1406f2644e1b55d379b0cb3a90c6396a7cf2f0da09717f3f767e2d50725680ca74814fb30d75ab93f9271a6e43e1978b93a54319c0c92852cc95e0bdcab7641fb6240e8d3e8fbe7282ed1caf7eadb9636294cfe02fb8fb4f2de44b6cfc4351632103842a3d4e09c3341f193d641a86d3fe048b2d0121905dc3dfba29a63dfe5cf9d9b27de066095cd8b71b764493b74700f6eb038357d8a0311465462e7d7155882c", @ANYBLOB="58f66dbba2e67f79ae8ebb5defd0dc23874f6d283a3110d17f40ec6db83ff858addf559bf5f11ec1f1dae8130d394d6423bfe6bb", @ANYRESOCT=r1, @ANYRESOCT=r1], @ANYRES64=r3, @ANYRESDEC=r0, @ANYRESOCT=0x0, @ANYRES64=0x0], @ANYRESOCT=r4, @ANYRES32=r0, @ANYRESDEC=r3]) syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x7, 0x5, &(0x7f0000000540)=[{&(0x7f0000000280)="ad04f35ee5b5e0aaf2f3331287a5f576833758e18d", 0x15, 0xffffffffffffff2e}, {&(0x7f0000000440)="f03830d35372dc189915e9e08013e7bb6568a9650c1c353bd3", 0x19, 0x1}, {&(0x7f0000000480)="966f62605cc3388ae51ea9212cbb7ae8e0ad054a3ff6c4b15b56c43d397afe1a54f33b75a42777ab19a65c1689d589d9f1ab3834dfcef2faa76d73", 0x3b}, {&(0x7f00000004c0)="483d55c99d1990ad8318858607f42faf2995ce1ce633bd0983020d53e1139a6d4adb", 0x22}, {&(0x7f0000000500)="7d956d63e6074bab26d3dfe47bbe55", 0xf, 0x176}], 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB="737562766f6c69d986cc2acb4c6a48504f643d3078303030303030303030303030303030332c6e6f64617461636f772c6e6f64617461636f772c7373645f7370726561642c667261676d656e743d6d657461646174612c736d61636b66736465663d2c00"]) ioctl$KVM_NMI(r4, 0xae9a) timer_create(0x7, &(0x7f0000000640)={0x0, 0x37, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000680)=0x0) timer_getoverrun(r5) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/policy\x00', 0x0, 0x0) write$P9_ROPEN(r6, &(0x7f0000000100)={0x18, 0x71, 0x1, {{0xa, 0x4, 0x1}, 0x5b}}, 0x18) dup3(r2, r2, 0x80000) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:24:36 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x3f00}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:36 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:24:36 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x21000000, 0x4a}) 17:24:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03fb8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03cafa64243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:36 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x968b000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:36 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x800000, 0x4a}) 17:24:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(0xffffffffffffffff, r2) 17:24:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03cafb64243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:36 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x48002}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r4, 0xc0405665, &(0x7f0000000180)={0x80, 0x3, 0x6, 0x4, 0x93a, 0x8, 0x4}) mkdir(&(0x7f0000000080)='./file0\x00', 0x48) ioctl$KVM_NMI(r3, 0xae9a) io_setup(0x151e4000, &(0x7f0000000100)) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x32) 17:24:36 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x8c93, 0x4a}) 17:24:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:24:36 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x8000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca81fb243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:36 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xc88, 0x4a}) 17:24:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:24:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="1a4663e90e9113e4d0d75c961e0abf47d00bb0cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca81fa243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:37 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x300, 0x4a}) 17:24:37 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x2200}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:37 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x384000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164fa3e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:24:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x4000, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:24:37 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x186000000000000, 0x4a}) 17:24:37 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x3000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164fb3e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:37 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2000000, 0x4a}) 17:24:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:24:37 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xbffb}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:24:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca816424fa890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:37 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x1800000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:37 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xa00, 0x4a}) 17:24:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:24:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca816424fb890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:37 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xffffffff00000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:37 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x3964020000000000, 0x4a}) 17:24:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:24:38 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xff7f}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243efb0000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f0000000080)={0xa5, @empty, 0x4e21, 0x4, 'ovf\x00', 0x2, 0x2, 0x1}, 0x2c) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000100)=ANY=[@ANYBLOB="cba38049c4a903263b4040488d8f958a0b7efa441628d85019117906377aca95a5d26e8b6b"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:38 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x22000000, 0x4a}) 17:24:38 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xe00000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r2) 17:24:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243efa0000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:38 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1800100, 0x4a}) 17:24:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000140)={0x1, 0x3000, 0x0, 0x9, 0x6}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x2, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r4, r5) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x10401, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r6, 0xc040563e, &(0x7f0000000180)={0x1, 0x0, 0x102, 0x4, {0x9, 0x2, 0xc3, 0x8d}}) sysfs$3(0x3) r7 = memfd_create(&(0x7f0000000080)='/dev/kvm\x00', 0x6) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000100)={0x2, r7, 0x1}) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r6, 0x84, 0x21, &(0x7f0000000280), &(0x7f0000000400)=0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:38 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2100, 0x4a}) 17:24:38 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x25806}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r2) 17:24:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e89000000fb215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:38 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x2000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:38 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xfffffdfd, 0x4a}) 17:24:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cf"]) ioctl$KVM_NMI(r3, 0xae9a) r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x4, 0x8000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @multicast2}}}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000240)={r5, 0x3f}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, 0x0) dup2(r0, 0xffffffffffffffff) 17:24:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e8900f0000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:38 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x80030000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:38 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x8601}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x0, 0xffffffffffffffff}) dup2(r0, r3) 17:24:38 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xe8020000000000, 0x4a}) 17:24:38 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x2, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7fff, 0x131000) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r4, 0x111, 0x4, 0x1, 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000200)="660f388093080000000f01d143d151b448b800800000000000000f23d00f21f835300000000f23f8c4a1057c142966470f380351000f01df64450f01df410f32440f017e08"}], 0x1, 0x0, 0x0, 0xfffffffffffffcf3) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e891000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:38 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x4000000, 0x4a}) 17:24:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890200000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(0xffffffffffffffff, r3) 17:24:39 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xc00000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:39 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x80830000, 0x4a}) 17:24:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e891927000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:39 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x5c0200}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = geteuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x20, 0x3, &(0x7f0000000140)=[{&(0x7f0000000200)="6f53f0315d3f663f8f54863801d4e06995300ec625fef53fd9cd65f03268e63f2fd684f3428ea3063f8d500f6497e82979c405a2a0adf3205a1deb138765c07cd9a8f72c23d676529a3555fdb837f7144ea8138c292f0eec5dc1dcfae103970f80fc2392ec660c36b4c185d78105c7fe09d6224214f4b6c66aebb1f29b59fe062d851addc69f0e3139c81a302cc3ac30397b61db761124b98511", 0x9a, 0xfffffffffffff800}, {&(0x7f0000000300)="1f992bdd999a06f4decd9d455c6d6096f67c8967bb83c555991c5a6ed50c836a5e6b147e1d209026041f8a342aceb6f6ed1f3d600744f766940651841c31255e57fb0d67022330436babacfb6a553572cd821c3fb2410116bdb06685b44ca172688d83d38e57b3a87bb47ce2b287f53c94b4e105cecdeafe99b30d7270ee5f8d5dff45885e7502a88a492684b4dbd677894c281ff58c12056354db6d", 0x9c, 0x1}, {&(0x7f00000003c0)="f5161ad5705863efa678aa61f614453caa5f4f31c8861c4e69666a1e6283b2a82bfd261531e1c4c59c4537c26a0007cb9c34c4f2254d03eb9c111234bf74ce3b5b2fca361687a29738aeb76f3538ea89ff6201aac42293d68fc9b3501da7bba477a1bd06cbfb3cb0f2f43a255481825cd693d1f6bc05d38e5c9a7979658a0cdda7fa7d01efab0ca4fa51a639fbd079e28e2f4bb83b1dd4bbd4602bc4084582bb78e0c866293d10ae60479ee8afed1a925d4fbf96de0ddb92756d809c6516829503249ac93b2a5dc7b74d5b4c851abfa425", 0xd1}], 0x12410, &(0x7f00000004c0)={[{@pqnoenforce='pqnoenforce'}, {@inode64='inode64'}, {@logdev={'logdev', 0x3d, './file0'}}, {@dax='dax'}, {@filestreams='filestreams'}, {@bsdgroups='bsdgroups'}], [{@fsmagic={'fsmagic'}}, {@subj_user={'subj_user', 0x3d, '/dev/kvm\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@dont_appraise='dont_appraise'}, {@fowner_eq={'fowner', 0x3d, r5}}, {@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}]}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:24:39 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x80dd020000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4}) dup2(r0, 0xffffffffffffffff) 17:24:39 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x4, 0x4a}) 17:24:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e8900e0000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:39 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x10}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:39 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x10000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:39 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x284bd, 0x4a}) 17:24:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) pipe(0x0) 17:24:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:39 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xd000000, 0x4a}) 17:24:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890800000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) [ 2488.534953] SELinux: mount invalid. Same superblock, different security settings for (dev tracefs, type tracefs) 17:24:39 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xff0700}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:39 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xa00}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) [ 2488.603489] SELinux: mount invalid. Same superblock, different security settings for (dev tracefs, type tracefs) 17:24:39 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x18001, 0x4a}) 17:24:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e89c00e000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) pipe(0x0) 17:24:39 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x1080000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:39 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xf00000000000000, 0x4a}) 17:24:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e89000f000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) [ 2488.964392] SELinux: mount invalid. Same superblock, different security settings for (dev tracefs, type tracefs) 17:24:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890ec0000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x4, 0x4100) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) sendmsg$nl_xfrm(r5, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x50000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=@getpolicy={0x15c, 0x15, 0x10, 0x70bd29, 0x25dfdbff, {{@in=@rand_addr=0x8, @in6=@mcast2, 0x4e24, 0x20, 0x4e24, 0x9, 0xa, 0x0, 0xa0, 0x3f, 0x0, r6}, 0x6e6bb1, 0x1}, [@algo_comp={0xbc, 0x3, {{'lzs\x00'}, 0x3a0, "17805399e8e422e7abd8f6d2fa028d44a50150f6fb0ba090c04cb8cf4a41b45121c304983c8b37ab98a3f6898d51e33e3f5d04b04f8c36216aee961a429cf8d849589d73668085804a830d8f563ec32cf5e2a5294eaf99ac942f9169b182cd198629edd48a3ef67bad69e3aa677c305c959c0212"}}, @srcaddr={0x14, 0xd, @in=@broadcast}, @replay_esn_val={0x3c, 0x17, {0x8, 0x70bd2c, 0x70bd26, 0x70bd2c, 0x70bd28, 0x200, [0x5, 0x3ff, 0x7, 0x89, 0x7, 0x1, 0x6, 0x9]}}]}, 0x15c}, 0x1, 0x0, 0x0, 0x40001}, 0x50) ioctl$KVM_GET_PIT(r3, 0xc048ae65, &(0x7f0000000100)) 17:24:40 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1000000000000000, 0x4a}) 17:24:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e89fb00000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:40 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x400000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) pipe(0x0) 17:24:40 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x1000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e89f000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:40 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1000000, 0x4a}) [ 2489.287352] SELinux: mount invalid. Same superblock, different security settings for (dev tracefs, type tracefs) 17:24:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000100)=ANY=[@ANYRES32=r4, @ANYRESDEC=r3, @ANYRESDEC=r3, @ANYRES16=r1, @ANYRESHEX=r0]) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:24:40 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x8083}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e89000000fa215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:40 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x800400}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:40 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x800000000000000, 0x4a}) 17:24:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) pipe(0x0) 17:24:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e892719000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) [ 2489.593054] SELinux: mount invalid. Same superblock, different security settings for (dev tracefs, type tracefs) 17:24:40 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x482, 0x4a}) 17:24:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:40 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x7f00}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e89e000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:40 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x8085, 0x4a}) 17:24:41 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x880c}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) [ 2489.944544] *** Guest State *** [ 2489.948227] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 2489.958031] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 2489.968420] CR3 = 0x0000000000000000 [ 2489.974692] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 17:24:41 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x12000000, 0x4a}) [ 2489.992392] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 2489.999016] SELinux: mount invalid. Same superblock, different security settings for (dev tracefs, type tracefs) [ 2490.019564] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 2490.031135] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 17:24:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890f00000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) [ 2490.065670] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 17:24:41 executing program 1: syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:41 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xd1840200, 0x4a}) [ 2490.105962] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 2490.142837] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 17:24:41 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xff7f000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) [ 2490.161575] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 2490.185149] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 17:24:41 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x48000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) [ 2490.209390] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 2490.294060] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 2490.321905] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 2490.335118] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 2490.393344] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 2490.407510] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 2490.415159] Interruptibility = 00000000 ActivityState = 00000000 [ 2490.421504] *** Host State *** [ 2490.425686] RIP = 0xffffffff8120495e RSP = 0xffff88817f31f390 [ 2490.431884] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 2490.438895] FSBase=00007fadd5af5700 GSBase=ffff8881daf00000 TRBase=fffffe0000033000 [ 2490.447688] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 2490.453805] CR0=0000000080050033 CR3=00000001d92e1000 CR4=00000000001426e0 [ 2490.461380] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff87e01360 [ 2490.468709] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 2490.475327] *** Control State *** [ 2490.478997] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 2490.486178] EntryControls=0000d1ff ExitControls=002fefff [ 2490.491867] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 2490.499349] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 2490.506528] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 2490.513311] reason=80000021 qualification=0000000000000000 [ 2490.520963] IDTVectoring: info=00000000 errcode=00000000 [ 2490.526930] TSC Offset = 0xfffffac871413a2e [ 2490.531469] EPT pointer = 0x00000001cd64401e 17:24:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) r5 = dup(r1) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000140)=0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001640)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r5, &(0x7f0000001880)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001840)={&(0x7f0000001680)={0x1b4, r8, 0xa, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4dd8eff8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @rand_addr=0xfffffffffffffffa}}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x23}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x68}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3e}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9b64}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1a}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffff}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast1}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xbb}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x40000}, 0x80) sendmsg$netlink(r5, &(0x7f00000015c0)={&(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbff}, 0xc, &(0x7f0000000280)=[{&(0x7f0000000300)={0x12a4, 0x36, 0x100, 0x70bd28, 0x25dfdbfe, "", [@typed={0x8, 0x2a, @pid=r6}, @typed={0x8, 0x47, @uid=r7}, @generic="c6e2d0afc3dce7eb4a43b588a4a767d48619d23a7725e98ee27208da903f25224483cefe89c7fd6875ceee14b689e38e1134ccc011349488d8c71bd934ac82f8e68fe229bc6d7615aaea57085d1a656595091733cde87eafae54eb96739cdd0b521ccb7c3e3da3bd1a303ddc69c9a0f0ea552c17e90b0a0d15f1c4554b", @nested={0x1130, 0x3a, [@generic="8f3687c6a67a17c6c60ae736d2d13b3fc141b133be5a26f230a3922587abb2b8e4c45cd58e4086f9d0afd9a46777eaf4b1af3f671f82c9c5fc0017844ddf443e6e6ed614e0260aae6858ed9c48089d352c2b8ffedf8d94cf9e9d584b427a29f550db65aa26a7a82df46b0402655bf7c3c5bc7946a2e5543a2d89e7e9ac46224743ea680b512411f6733a6045a9017274318a12e39de282", @generic="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", @generic="f028fe44f1d807c6b6b74d45644210a6c5fc3b9ae24622b9b5750123e76b0ce68055074e7d5fb136970eed6a3bd7df63338ab32c1c2a5041453d2a858f65578626fb2461a1fff8d94b34d9506af8885ac92bb6e01d9255afa6fec7ffdea487e924e5d94723d59f82d48dcf3160da53822388e3", @typed={0x14, 0x6d, @ipv6=@dev={0xfe, 0x80, [], 0x1b}}, @typed={0x8, 0x54, @u32=0xfffffffffffffffa}, @generic="26d30985"]}, @generic="3d2e3cfd82d5df36c2e3781be09e568a88270ae42dd29a074c54451fde8127290e9af03c9c103b3e53b2e74f5b12b9e301ddb91cd7f0ae2e1beb3ead5b5ae358f012abb7d8a8bdc393e6663ceb37b54a7c3f79c502bd7a210ee600af573d", @nested={0x78, 0x2e, [@typed={0x74, 0x32, @binary="f8538ff477f0b31be5a2c9bde921e3768a1d8dd04df5a3d48e2712e367456a70fab8a1f8b57ad347bff35c82b495bcbac379639fce5bd172c988c4e0c8320a095a634247de0b340452f1de46060d8075e1431545cdf1fd278a1452adbae8aeba4edbeb6a0e59913f3fb2b8f3554e2e"}]}]}, 0x12a4}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) write$P9_RLERRORu(r5, &(0x7f0000000080)={0x16, 0x7, 0x1, {{0x9, '/dev/kvm\x00'}, 0x1}}, 0x16) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:24:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e8900fb000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:41 executing program 1: syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:41 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x265bd}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:41 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x8085000000000000, 0x4a}) 17:24:41 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x180020000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:41 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xd184020000000000, 0x4a}) 17:24:41 executing program 1: syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e8900e0000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:42 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x180030000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e89000ec00a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:42 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xd958020000000000, 0x4a}) 17:24:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:42 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x186}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890002000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:42 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xbbdf0000, 0x4a}) 17:24:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_FPU(r3, 0x81a0ae8c, &(0x7f0000000300)) 17:24:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890027190a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:42 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x86030000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:42 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x3f00000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:42 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x86030000000000, 0x4a}) 17:24:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890010000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:42 executing program 1: mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:42 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xbd840200, 0x4a}) 17:24:42 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x968b0000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:42 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x4820000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e89000f000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000080)={0x0, @aes128, 0x2, "86df358e0303c49f"}) 17:24:43 executing program 1: mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:43 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x6000000, 0x4a}) 17:24:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e8900c00e0a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:43 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x43800}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:43 executing program 1: mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000fb0a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:43 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x8000000, 0x4a}) 17:24:43 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x1800300}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:43 executing program 1: r0 = syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:43 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x80000000000000, 0x4a}) 17:24:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000f00a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:43 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x7, 0x20000) setsockopt$inet_buf(r2, 0x0, 0x23, &(0x7f0000000300)="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", 0x1000) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f0000000080)={0x7, 0xb5, 0x4, 0x2, 0x1}) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:24:43 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x25800}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e8900000f0a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:43 executing program 1: r0 = syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:43 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xd00000000000000, 0x4a}) 17:24:43 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x1800400}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e8900fb000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:43 executing program 1: r0 = syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:43 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x860300, 0x4a}) 17:24:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@local, @in6}}, {{@in=@multicast1}}}, &(0x7f0000000240)=0xe8) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = semget(0x1, 0x2, 0x0) semctl$GETPID(r5, 0x6, 0xb, &(0x7f0000000400)=""/175) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000180)=ANY=[@ANYBLOB='\b\x00\x00\x00']) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) r6 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) getsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:43 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x6000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890008000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:44 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x40260000, 0x4a}) 17:24:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000e00a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:44 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x7f0000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e8900f0000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:44 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2e800, 0x4a}) 17:24:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x80, 0x0) 17:24:44 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x8601}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890019270a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:44 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xe, 0x4a}) 17:24:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:44 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc88}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:44 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xe00000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000100a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:44 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x6580200, 0x4a}) 17:24:44 executing program 1: syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:44 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1800000, 0x4a}) 17:24:44 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xbd84020000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00']) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:44 executing program 1: syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:44 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x400000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000fb0a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:44 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2dd80, 0x4a}) 17:24:44 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x1800100}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000080a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:45 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x5c020000000000, 0x4a}) 17:24:45 executing program 1: syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:45 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x11e040000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:45 executing program 4: socketpair$unix(0x1, 0x8000000000, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x80000000000000) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000200)=ANY=[@ANYBLOB="cb43058ec45fe9f9c343cbed3d85901f0d6a43d9c8b1f19014af3612dca55c50b54c21f12fcd78d02487564ec1d1327dde5a38fef0643a3090f1b8f19551245897b18622a12ec6287e1c4b3c9174348ea92e3a58cbaed0f1436680af5a0de7914078d330"]) ioctl$KVM_NMI(r3, 0xae9a) ioctl$DRM_IOCTL_GET_STATS(r3, 0x80f86406, &(0x7f0000000080)=""/10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:45 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xd1840200}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e8900000f0a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:45 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x3000000, 0x4a}) 17:24:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x4c800, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="94ce1b0035c639c4cc0c574a4dc11865613474ac8f74ee2d68cbfbb00e5a1c32dcb1fb12e3a76673300381dc0541573bfcfa903544d36c343f99a546adf2de23eb8304b23792ac7c48c5bdbe1b6b52845a7e2e3cfeb3573a3a251fd679e93da3b622806dc72b8811b5b298437a8fd3e163b93eea964b7c714a02d0f90b06fa7a0bb54645693202570234200920ff9462c0fea626e029e5cfb0b3cc0fc20118f47a1cfe5f591734d02f8c89fdb24813ee2e412e349daaeca239ccfd09532ab377c5f115eaeeb97d504903c4307b04c83743c64bca73e8fc13424c0889178c012ab90070f2d2aeb2c44f62ffc901065a7957e550344e5b03236ad7a36cbdc6346c1ef313738624643501565481efb7ad3e36ed32321b806b851199e2c5492e5d6bcd515d3cdb8cb1347cf546bda9d304138164f62582220ac88a9bbfffbc629097802fe50243274948"]) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:24:45 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x38600}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e89000000fa215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:45 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xf, 0x4a}) 17:24:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:45 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x8204}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:45 executing program 4: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0xe) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:24:45 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xa, 0x4a}) 17:24:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e89000000fb215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, 0x0, &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:45 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xbffb}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:45 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x166020000000000, 0x4a}) 17:24:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000020a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, 0x0, &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:46 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xa00000000000000, 0x4a}) 17:24:46 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x2100}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000e00a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:46 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x3f00000000000000, 0x4a}) 17:24:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x40, 0x0) write$P9_RMKNOD(r3, &(0x7f0000000200)={0x117, 0x13, 0x2, {0x80, 0x0, 0x8}}, 0x14) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="4ab1ae8ac488ed16ce453aeb5320ab82b7298247feb357654a7998e7b7a914b29522be6b48e79ed3325cb361cf43aa438d821dbbd2cbaf870e2985ecef99e2dbd2b103f4c3956bc065de1b33820e638c0f596e79148efcdd3620d2231057b0b3498bb4a44286eaef205f943c0cbf8d7c13d1b7eaeada00a533d0b720d792ce9df8cd1e9aba308bc25fca8b59f7ac38712bc9c5cb28bfdccbbc42f9eab4819c42402f9aad8a3a3c0c2b586becefe7988bea791921c7e8bbabdd900dec3795fff3cc1ca66964d55045215212f919d4b4529b8edb784202b8c72f6b0be8232b9365"]) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r5, 0x10e, 0x8, &(0x7f0000000100)=0xfffffffffffffffe, 0x4) 17:24:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, 0x0, &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) 17:24:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e89000000fa215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:46 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xb000000, 0x4a}) 17:24:46 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x265bd}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:46 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x300000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e89000000fb215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 17:24:46 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x800100, 0x4a}) 17:24:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000afa5a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:46 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x80040000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:46 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x8083000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x600400, 0x84) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:46 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x4a, 0x4a}) 17:24:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 17:24:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000afb5a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 17:24:47 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xbbdf, 0x4a}) 17:24:47 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xbbdf000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:47 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x4000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a21fa0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, 0x0) 17:24:47 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x8404, 0x4a}) 17:24:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a21fb0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x2, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:47 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x6580200}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, 0x0) 17:24:47 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x3426000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:47 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x5, 0x4a}) 17:24:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215ae004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a1004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, 0x0) 17:24:47 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xff7e0000, 0x4a}) 17:24:47 executing program 1: ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x7fff) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001f7, 0x1000000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pause() 17:24:47 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x21000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xfffffe20) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:47 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xbd840200}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215afb04fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:48 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1080000, 0x4a}) 17:24:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0804fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:48 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x800400}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0f04fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:48 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x3626000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:48 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x8601, 0x4a}) 17:24:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000100)=ANY=[@ANYBLOB="25ecff06e49de6575691f2b85ef9431fc12fcc860a2fbfae3ea6d4a74f6aa1c9169a3b1260fd1056a87d23b826b3c3a99acd8cc6559e93af96ba28dee43eaf21beac5209116a3a562d9506c47a97d7b8643a4920ed51f24f0e"]) fchmod(r2, 0x2) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:24:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0204fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:48 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x8087, 0x4a}) 17:24:48 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xd958020000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:48 executing program 1: pipe(&(0x7f0000003fc0)) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') fremovexattr(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) socket$inet6_tcp(0xa, 0x1, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x3a) pipe(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:24:48 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x800200}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) set_mempolicy(0x8000, &(0x7f0000000080), 0x8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000ff9000/0x1000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="30524d521fd00affd99eb85a2800f18d1d8bf57e66b19288e5394cc77fb0f0a63d60b03cd4afe3f003e6457feffa6e49408490897fe377e3395630ff0d2fa21b1fd2e0d889a2dcdd7c004a52307e2936137969dedbc9c16f444993f8389e411e9a08828c7f0dc7eea049c4e8637e294d5dec103c6799315b5b74e00151a0ee7b04bc3c58f1127d1418c43fc1b36546e3b918e800e6703274888ced705616ccb133e62c54efb8ec784be2e3922cf94d92b9af98af4b38072b7dbd38af27e4a86f5e608e55796cda0e737ef1383b0d1eed3ac49986df9cd6210c53769411e9f14612"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r4, 0x40087705, &(0x7f0000000140)={0x9, 0xa0}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:48 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x48001, 0x4a}) 17:24:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a00fbfbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) [ 2497.851809] SELinux: mount invalid. Same superblock, different security settings for (dev tracefs, type tracefs) 17:24:49 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x600}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) [ 2497.910668] SELinux: mount invalid. Same superblock, different security settings for (dev tracefs, type tracefs) 17:24:49 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x1115040000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a00fafbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="cbbbbe445ca624acff77ba2c5e1cd51c75ced9b7756010032c6afb185847e3a83247ea602a"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:49 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x6a15040000000000, 0x4a}) 17:24:49 executing program 1: pipe(&(0x7f0000003fc0)) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') fremovexattr(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000040c0)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) socket$inet6_tcp(0xa, 0x1, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x3a) pipe(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:24:49 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xff7f}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) [ 2498.197153] SELinux: mount invalid. Same superblock, different security settings for (dev tracefs, type tracefs) 17:24:49 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xff070000000000, 0x4a}) 17:24:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a00fafbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="b79300e0ff0000000000c9"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:49 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x8780}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:49 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000005580)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000002240)=""/210, 0xd2}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp6\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 17:24:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a00fbfbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:49 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x80020000000000, 0x4a}) 17:24:49 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xbbdf000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004faf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:49 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xff7f, 0x4a}) 17:24:49 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xc00}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x8040ae9f, &(0x7f0000000080)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x20) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x2000000, 0x20013, r3, 0x0) memfd_create(&(0x7f0000000180)='/dev/kvm\x00', 0x7) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000140)=0xfffffffffffffff9) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbfb0dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:49 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x11150400, 0x4a}) 17:24:50 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x86030000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:50 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x8c93}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') preadv(r0, &(0x7f00000002c0)=[{&(0x7f00000003c0)=""/108, 0x6c}, {&(0x7f0000000100)=""/98, 0x62}], 0x2, 0x0) 17:24:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbfa0dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:50 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x4820000, 0x4a}) 17:24:50 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x284d1}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:50 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xb00000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf5fbfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:50 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x200000000000000, 0x4a}) 17:24:50 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x84800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KDENABIO(r5, 0x4b36) socketpair$unix(0x1, 0xaa98c0aa67ae3d2f, 0x0, &(0x7f0000000100)) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r0, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:24:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000180)="0fae0165260fc79ff17c3e64f20f5f9ab94666b92d0200000f3266b80000aac60f23c00f21f86635030002000f23f826670f01cfb880068ec866b9800000c00f326635004000000f300f229b0f2297", 0x4f}], 0x1, 0x20, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() 17:24:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf5fafff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:50 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x3}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:50 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xff7f0000, 0x4a}) 17:24:50 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x482000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:50 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xf00, 0x4a}) 17:24:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfffa0003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfffb0003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x2, 0x2, 0xfffffffffffffffc, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r1, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:51 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xe000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:51 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xff7e000000000000, 0x4a}) 17:24:51 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x38040000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000180)="0fae0165260fc79ff17c3e64f20f5f9ab94666b92d0200000f3266b80000aac60f23c00f21f86635030002000f23f826670f01cfb880068ec866b9800000c00f326635004000000f300f229b0f2297", 0x4f}], 0x1, 0x20, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() 17:24:51 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x938c0000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:51 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc88000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:51 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x400400, 0x4a}) 17:24:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x1, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="cbffb2b190f82c07b8f401910aeea9185d4b43f9c07ccd45f781d2091e0ac5746f0fa65f7d3282926d91"]) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) getpeername$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000100)=0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:24:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90203a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff9e003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:51 executing program 1: 17:24:51 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x26601, 0x4a}) 17:24:51 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x28000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:51 executing program 1: 17:24:52 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xe8020000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff91003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:52 executing program 4: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:52 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x8204, 0x4a}) 17:24:52 executing program 1: 17:24:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff9fb03a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:52 executing program 1: 17:24:52 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x48000, 0x4a}) 17:24:52 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x22000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x40, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = fcntl$dupfd(r1, 0x406, r0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r5, 0x28, &(0x7f0000000080)}, 0x3) 17:24:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff9d000a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:52 executing program 1: 17:24:52 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xff070000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:52 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xf66020000000000, 0x4a}) 17:24:52 executing program 1: 17:24:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90005a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:52 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x18000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:52 executing program 1: 17:24:52 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xf000000, 0x4a}) 17:24:52 executing program 1: 17:24:52 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xb00, 0x4a}) 17:24:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000100)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000180)={r4, 0x100000000, 0x9}, &(0x7f0000000200)=0x8) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90803a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:53 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x5c020000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:53 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xff7f0000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:53 executing program 1: 17:24:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90f03a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:53 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2100000000000000, 0x4a}) 17:24:53 executing program 1: 17:24:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff900faa5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:53 executing program 1: 17:24:53 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x900, 0x4a}) 17:24:53 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x1660200}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x9, &(0x7f0000001640)=[{&(0x7f0000000140)="c00558a8747f00a6eafa54e80c4406622476bbb20e90c0404ef084796b8307af12849a4c0bff", 0x26, 0xae84}, {&(0x7f0000000180)="1f90ec4827192699b1d21481d177fac38e2f6711aafa6368e9d11b4200b52e49be21f76feb8a1147fa2d72", 0x2b, 0x8}, {&(0x7f0000000200)="2c27a02dd1feee89213adde3f4176899f85400533e3a6e5c338ddfadc96b0aac75ffb872a8f331e18a39b887b4e827dfb142bf189b9f5540824bb232b63bdd67abf75f04ae07e0a2f03469a842d2d2dfa311d332582937f264a80ed60646ba746531737b1f1f2205d1853d2377b55036e2f2fb9f2f5b17dc33f4ef2298f88c5a7e79", 0x82, 0x7ff}, {&(0x7f0000000300)="2f11f41d03d5a1c4fcc0145f8a651d513699833ed50d17fe81d15abafb9361f6e6b2255f0684f82aee1e08097af828692036088a7b6150b484840f9ff0362bfc7b34b6ca799bde15ed90170ff26e9ca12835ad22a163f66732df9a09c07974fe04f9cd3020c13187c8c367306843f1d95cdf9d8627af81fe74706175864bd5ec4b8f5371e9830e495539f67cbe9dac60f8c731ea8c249447af86f46d55720cee8cdb6716d6dac27f2bbce0c38061f2", 0xaf, 0x3f}, {&(0x7f00000003c0)="52f0898aef26c722f84c31bd8194eb3ee8a6b01d022b", 0x16, 0x6}, {&(0x7f0000000400)="5b12f8c6cadbecfd55402e42f585c0daa80aa5539bd834332dcc6d4e2c8d3f23a8065ac9448c7ffd7bc0ba354a43ba53fd935938024002a46286eba504075541300230db07ffe9b96b4721db0a896bdf10d9dc692203a9c504bb36a156a11ef8526d0625b9e28ed5f91323f35c82830df5d6c912eda8edf41d53d8a5cca8a12b9fe45a7f051d6d3c24c67bacb86b14d2b0df113ecff67e2c7d3a1325c4ff26d99441312db2bebb197587f73b815659393540", 0xb2, 0x5}, {&(0x7f00000004c0)="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", 0x1000, 0x40}, {&(0x7f00000014c0)="0a422a9e9e7ce894a51ee8c7ea4c2d4555697ae694736db2bc255ff1cb8c138d08ebf8a5759e1a7636e1eca111c9b3c43283977f79955c1b0ebe96cfc2cf5cc5843758a6474db54c634e73ac74b7bd20c2fc26dac28918e573cce708ee744d8b61a2b7e3d3b57b7ffac8c48cc2ee4154c5f925c4ba844b5cf5bec49561f1b2f171a73ba3e03c36085f9f97095857faa0ba45262bbc26c67074fe0834b4fe199d17f6a4ea1f0e454688909f7a61e998c9aec37734342c7a11", 0xb8, 0x4}, {&(0x7f0000001580)="59eaac1afd669b7b741a65abdb4bd395f0d55a349cf36dc0ba2edcb164a6a71c727f00a3bce56f27bc63ab62c0f8b75c9783ccd5eacf8958fbfd66ee45176af1132cce82464900bc0057591cc8876c6d3d7d2ca213971cb231ed92d4a09b823443559892319d17f7cf79df8ee84f087b8abd1b91f24002ae2a8784e1003f9edcce6b42454459c37968b11a242c43a8fd2fdf7c51", 0x94, 0x4}], 0x1, &(0x7f0000001800)={[{@shortname_lower='shortname=lower'}, {@utf8no='utf8=0'}, {@utf8no='utf8=0'}, {@uni_xlateno='uni_xlate=0'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/kvm\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x1803}}, {@permit_directio='permit_directio'}, {@fowner_eq={'fowner', 0x3d, r3}}, {@smackfsroot={'smackfsroot', 0x3d, ':ppp1#bdevvmnet1{$'}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@context={'context', 0x3d, 'root'}}]}) 17:24:53 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xff0700}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff900fba5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:53 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x8085}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:53 executing program 1: 17:24:53 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x500, 0x4a}) 17:24:53 executing program 1: 17:24:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90005a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:53 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x28001, 0x4a}) 17:24:53 executing program 1: 17:24:53 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x8c93}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90002a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x10002, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000100)=ANY=[@ANYBLOB="559db69ae050f3ffccbd6ec426b3246ce658c7db07a51801fa17ca198ce45d990f222a4278725a41c1d5b11a21e9aff396990680ccd3b33b0741196b0ccd6ada8910f3d2c381464ffe5bce3cfeb8713c327b176d75af60a9d6f46cd90c99d6805a5ed02bd0d62d6f1a7e6e01f94988789880658577a7a523226a788eeddb30f6716008710a1bef4d3e536f9178c467ff88bd4aefe99863"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:54 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x9, 0x4a}) 17:24:54 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x700}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:54 executing program 1: 17:24:54 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x968b000000000000, 0x4a}) 17:24:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff900faa5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:54 executing program 1: 17:24:54 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x21}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:54 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x80dd0200, 0x4a}) 17:24:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff900fba5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:54 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xdfbb}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:54 executing program 1: 17:24:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="2c93453c4d3e6ec326fd4aac1d70478bbb3b8fc5cdcfca11ac6d8bdead846fbd8062f68899b74bfc2b5a03db112ff558fbc00b0d1ac6419f5bb907454632d9d0edb9aca787bbd3e9584b78185087ef83b39bc9394fb77c5b7f16e8193d6f7ae54e075f75b410b98aaaee635e1958a4fa17103295cfd09257183ccc928dddf1e29d01baa6b6c8157cd4f03e61f369acac3307bef1a5e023c2d2abb5629d63afde34131db20cff6f4002651960e933cc12e2811b367ac4559a096295f37f4f044b51125c947eee0632330000000000006a5fe4f1d2f5af192e0ad1193a37e2af0f4956"]) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x24800, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'bridge_slave_1\x00', 0x0}) sendto$packet(r5, &(0x7f0000000080)="4f6d29af3d7426209c39aa1d542635ceffa39b2b018d87ef6d345e1274aed2e311ac6509098b68cbbb815bf0c23b2e552353bff09bda56cadd1d", 0x3a, 0x844, &(0x7f0000000240)={0x11, 0x2, r6, 0x1, 0x40, 0x6, @local}, 0x14) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:24:54 executing program 1: 17:24:54 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x18000, 0x4a}) 17:24:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003fa000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:54 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x8}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003fb000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:54 executing program 1: 17:24:54 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x38040000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5100004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:54 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x11e040000000000, 0x4a}) 17:24:54 executing program 1: 17:24:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500e004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xffffffff00000001, 0x2001) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, r2, 0x30, 0x0, @in6={0xa, 0x4e24, 0x220, @dev={0xfe, 0x80, [], 0x20}, 0x7e}}}, 0xa0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000100)=ANY=[@ANYBLOB="07bbfaf9e6fa8fcea01690ecad5681a1b55a6db168ceac3fbad75592654a398892e1c40c6e3124a6a338154dde1f301b273fccaffc5c08ef5424afc5e2068915f55f27a81ce5020fab98ea201a64453bcad6d30041b29c75cd28ba84c630ce55c4f18b9060361633eb6f1d7c"]) ioctl$KVM_NMI(r5, 0xae9a) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000240)={0x6, 0x1, 0xffffffffffffff94, 0x3, 0x9, 0x9, 0xfff, 0x1, 0x0, 0x5}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 17:24:54 executing program 1: 17:24:54 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x7}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:54 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x900000000000000, 0x4a}) 17:24:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5e00004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:55 executing program 1: 17:24:55 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x2dd80}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:55 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x7000000, 0x4a}) 17:24:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5080004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:55 executing program 1: 17:24:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x10003, 0x4007fd) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0x7ff, 0x0, 0x10000, 0x3f}) ioctl$DRM_IOCTL_SG_ALLOC(r4, 0xc0106438, &(0x7f0000000140)={0x100, r5}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:55 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x48000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:55 executing program 1: 17:24:55 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x80dd0200}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5271904000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:55 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x180030000000000, 0x4a}) 17:24:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000100)=ANY=[@ANYBLOB="cba80115c2d620a184b32afc00668c9b00f1fdf7669896a7ea1c06f870b3d6b805ce81cda7f985e4b01fb3d6c3a1ec3dac53d8535b435bdd1c1c27d8e78149a4373748004f073391d596a8db8d0a63270a59b722642218b7ad04161b64d7bd00d2399b15ebd84a5d80750838db8d430afd0db9458d085356ae7d0eee9ed5b4dda3923a811993dc814a87ae46fde67fc08cbdf6f4b4967c75d5282f257b594384606d80fde9a3d7ae715f62ceb862"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x101001, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:55 executing program 1: 17:24:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5f00004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:55 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x800200, 0x4a}) 17:24:55 executing program 1: 17:24:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500fb04000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:55 executing program 1: 17:24:55 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x1000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:55 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xc880000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:55 executing program 1: 17:24:55 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x25c00, 0x4a}) 17:24:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_mreq(r3, 0x29, 0x0, &(0x7f0000000080)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000000100)=0x14) r6 = geteuid() setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in=@local, 0x4e21, 0x1660000000000000, 0x4e23, 0xffffffffffffff7e, 0xa, 0x80, 0xa0, 0x5c, r5, r6}, {0xff80000000000000, 0x3, 0x9, 0x101, 0xf2b9, 0xffffffff, 0x6, 0x5}, {0xffffffffffffff10, 0x3, 0xac, 0x4}, 0xa1a3, 0x0, 0x0, 0x0, 0x3, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0xa}, 0x4d4, 0xff}, 0xa, @in=@remote, 0x3506, 0x4, 0x3, 0x6, 0x80000000, 0x6, 0x2}}, 0xe8) 17:24:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000f04000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:55 executing program 1: 17:24:55 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xd, 0x4a}) 17:24:55 executing program 1: 17:24:55 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x18000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50ec004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:55 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x5}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:56 executing program 1: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x802) 17:24:56 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x8580, 0x4a}) 17:24:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5192704000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5fb0004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:56 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) r5 = accept4(r1, &(0x7f0000000100)=@can, &(0x7f0000000080)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0x65, "18009c2434ad8282f9aa2c5ddd4b561d7e56983c117e93b4a56df2feb7356051ab64c46e1d76a2c4f42a71a647e12e72e98b540b007e196287c4496c2272b5700d872dd1335e580e11ca30f6cd6b5d82184bed27e34ba151fe5a329c8c4841e17d5e70792b"}, &(0x7f0000000180)=0x6d) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000280)={r6, 0x8b}, &(0x7f0000000300)=0x8) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:24:56 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x18001}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:56 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x7f00, 0x4a}) 17:24:56 executing program 1: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="5500000018007f5e00fe01b2a4a280930a600800ffa84302910000002d00090023000c000b0000000d000500fe8000000000c78b80082314e9030b9d566885b167320b00dc1338d54400009b84136ef75afb83de44", 0x55}], 0x1}, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 17:24:56 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x658020000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50f0004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5c00e04000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) [ 2505.330069] netlink: 9 bytes leftover after parsing attributes in process `syz-executor1'. [ 2505.367198] netlink: 9 bytes leftover after parsing attributes in process `syz-executor1'. 17:24:56 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:24:56 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x6, 0x4a}) 17:24:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5020004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:56 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x38001, 0x4a}) 17:24:56 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:24:56 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r2, 0xae9a) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2000, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:24:56 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x4}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500f004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:56 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x482000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:56 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x3, 0x4a}) 17:24:56 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:24:57 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:24:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500e004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:57 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x8, 0x4a}) 17:24:57 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x500000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:57 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc880000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5001004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000080)="0f474534260f6b4731660f68250f01cf3e0f00db3e360f011d9a544da900baf80c66b81b52af8c66efbafc0cb03eeed87cd6660fe4bc0f00", 0x38}], 0xeb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:57 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x658020000000000, 0x4a}) 17:24:57 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup2(r1, r0) 17:24:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500fb04000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:57 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x265bd}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:57 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x3f000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000804000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:57 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup2(r1, r0) 17:24:57 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x180040000000000, 0x4a}) 17:24:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x40, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x6, 0x1200000, 0x100000001, 0x6, 0x0, 0x80, 0x80200, 0x1, 0x4, 0x0, 0xe1, 0x87, 0x6, 0xd, 0x9, 0xfffffffffffffffc, 0x5, 0x7, 0x7fff, 0x1, 0x4, 0x1ff, 0x5, 0x8001, 0xfff, 0x9, 0x8, 0x36, 0x7f, 0x53, 0x7ff, 0x7f, 0x4, 0x6, 0x4f1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000280), 0xb}, 0x8409, 0xf255, 0x4, 0xc, 0x100000000, 0x4, 0xe7a}, 0x0, 0x8, 0xffffffffffffff9c, 0xa) r0 = syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000140)=ANY=[@ANYBLOB="8b316d5b2ad9b97e4569f82a502ddf7d9a467e128d915d55d85f29fc2b1afb847b6afca76fb3cce9f99735fe8a89ffb350e8db1ab5e94ac1701beba02f8c69bfbda5722c7ed97c09d2a73fac1ed8af56b66eeaf6d183be95889f143fc875500c7aac02f8eee82906cfbc9d9cd1e389ebd607a196348bb3e9dff015"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bind$llc(r4, &(0x7f0000000100)={0x1a, 0x323, 0x7, 0x800, 0x8001, 0x4, @link_local}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:57 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x900}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:57 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x180040000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000f04000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:57 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup2(r1, r0) 17:24:57 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xfbbf, 0x4a}) 17:24:57 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(0xffffffffffffffff, r0) 17:24:57 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x25c00}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000fa000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:57 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xbffb, 0x4a}) 17:24:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 17:24:58 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:24:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000fb000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:58 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xa000000, 0x4a}) 17:24:58 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x80020000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:58 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x12}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:58 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xc00, 0x4a}) 17:24:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000204000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x410000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000fa000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:58 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x180, 0x4a}) 17:24:58 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xffffffff00000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:59 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:24:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000fb000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:59 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x25806, 0x4a}) 17:24:59 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x41511}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:59 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x21000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cf"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x4, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:59 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x400000000000000, 0x4a}) 17:24:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004f0ffffff5e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:59 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0xc}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:59 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x80850000, 0x4a}) 17:24:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000e05e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:24:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000080)={0x100000000000000, 0x1000, 0x65c000000, 0xa, 0x5}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000100)=ANY=[@ANYBLOB="27772d5a4ae414b1"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:24:59 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:24:59 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x1800400}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:24:59 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0xbbdf000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:24:59 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xe00, 0x4a}) 17:24:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000019275e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:00 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x3f000000, 0x4a}) 17:25:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400000ec05e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004192700005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:00 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x26601}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x8100, 0x0) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0xfa29, 0x280202) getdents(r3, &(0x7f0000000100)=""/171, 0xab) 17:25:00 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x108, 0x4a}) 17:25:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004271900005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:00 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r0, 0xffffffffffffffff) 17:25:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000180), &(0x7f0000000200)=0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPOUT\x00', &(0x7f0000000140)='\x00', 0x1, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB='\b']) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x7, 0x80001) ioctl$SNDRV_TIMER_IOCTL_GINFO(r5, 0xc0f85403, &(0x7f0000000300)={{0x3, 0x3, 0x8000, 0x2, 0x3a46}, 0x34d, 0x4, 'id1\x00', 'timer0\x00', 0x0, 0x2fc, 0xffffffffffffff80, 0x6, 0x3}) 17:25:00 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x600000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000040f0000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:00 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x22, 0x4a}) 17:25:00 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x5}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:00 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xe00000000000000, 0x4a}) 17:25:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004020000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x4000) ioctl$sock_bt_hci(r2, 0x400448dd, &(0x7f0000000300)="7b8fb85eb87aab510b2539395ca78c261f9fbd157974b135c8e3cbfbf1d8d50a2f58108c5b78cc79be88b5803745da19c1e97f097dea486e96787239fb124917a2cbe0af687704dc47285d77c1c8dc5e141e5af62f2bfe31d457195a83c9d0465a2e7fe933a0a4785e6163e21bb08ee5156e70fa7ac55a52d6a87bcd06dbf9d7fb25ef97ffb97aafdd43050faee3626de1298875b71009d6bf0712b8bf9392d74e769a041287a80dc56fe3e47dac1dc1564ae2ccc831b6ac37a5a7c13838dec8427460d0b501bd929fe0fcca7e") r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000100)=ANY=[@ANYBLOB="16a8944989c539f388836c5913f07048c1ccacf5b36628c651df46f98c15dcde069952b9ed"]) r5 = dup3(r3, r4, 0x80000) ioctl$VIDIOC_S_FREQUENCY(r5, 0x402c5639, &(0x7f0000000080)={0x7, 0x7, 0x9cd}) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:25:01 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:01 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x938c}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:01 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x1800400}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) r4 = dup(r1) sendmmsg$alg(r4, &(0x7f0000007480)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001340)="081a08663f6eed6b759058f848503351971f103332c216f5be44386511eca2da68662dcfd3cf863f602a43913909d2a26843832ba1fa15a9fd698544ad8cf82e72443d1005d3654ae1413a048b8284bfadc4e6674c5f252dca88ef69d60e46410288b4878f5f439a576a8cb4f20cefc713e4c33a952fb3a90eceb0c4e3a9d56538cb578db19b1234a91d5e18fcbc634cb68289edd8d1acac77dae9da330c46b0afeac4ec3f3323544e68cc1a3ec1c40df8ad9c14e1f12d240f195e4e6f4497fc61f4ee34e11df69c482c92bb5b7b04b0a83e166be07c74210ac5ced4eeed0e4da38e", 0xe2}], 0x1, &(0x7f0000001440)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x7f}, @assoc={0x18, 0x117, 0x4, 0x6}, @assoc={0x18}, @iv={0xa8, 0x117, 0x2, 0x94, "6902845bcead7cc7acd77680fed38744d2db4ef1d8c07809be7a93d8e64f5cff555d0b81a2e0cabf6f09c6004b5d346d00b9ce49dc0be8d0e969f9d382c79c387e9544a1c9656089face29e198a04ffb334e741a626cda929080dd555e6424972e755d225681e2ec99aa0a51c887ce75c4683b47f5c5b269e6945f64fddd2698db11ad85e17c4294bdb92b796b33f04fd80adde8"}], 0x180}, {0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000180)}, {&(0x7f00000015c0)="801c3c225c98fcad843fa8230e5fc3b682963a9d58ea9abd2392de07984207128e11f72342424f2b3c1392cd800c7dc7b3741a5239874940287f9813b92972a87d046a2a137cab59238325e1f77e4949b0f0d06b2e8743f03c5e6310e1ec15a127045d9ffa481376db697cecfdb8fad64878315b4feddf00a317f443242ecbc181600cb2c785cae09918adaf4fb83e19d2c3e1b4ea90f6c3d2d9786f056e39c9a9", 0xa1}, {&(0x7f0000001680)="1799105c80f0fa9c2b9698bd5b7cb6fb558e6c3fc8f0279dfdb01ee0b02576dfae23350f43d514ab7e50730e2100b4ba0baf4eb05531d7ba0f242dd1afb7ff6cc7c97a845f2dcdfcacc4230af020ca7a839427be441c7240bad8afce48ba64bed0f5966a26607cbf136b73b3b04fcc0106056d62e64f9636d4a971f85f9ff5529a144ee673a51ccce069efb38968fbd2574f8900da27d77f0db430d2151b403590fb4b5639d61bacf4aa5797b79663b89a57", 0xb2}, {&(0x7f0000001740)="18725ac21474e591dd838bc7a98cf3997b74cff15e6036abecd3328ee756611a6a69d9ebf863b2ae8645fc5ce96232900ad64c035ce60e87021ef76bdf7c497e4628e68e936b9d0f8f0ce823627e4fa046357c4bad54905f7ba5486e9ec811260b945810a8292c265d0011c9030b33eca066a89cd13863b38b7468b86e9c3ecebd69ec92ceac73637e0b355cec7a0d1f5ef7d7066d589bd269864949d2b24b6ec827a17e73615b8886656c44e9f4b1b9134653d95b28ab01962f", 0xba}], 0x4, &(0x7f0000001840)=[@op={0x18}], 0x18, 0x41}, {0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000001880)="e85afc9059e7fe5c78e7bcc7db3c485fc7b8cd080580c9bd90878e9b1681b3d3911dbe945251eb41a47fab20f828dc330dc70fbf54566bff4cd8b3f4b9bf50970597e6633b80b985cbf77ccb7adb766167b08577820c11f870ee48a30f1575dd129274ac38e9e669bf1626c8d87e83a5298bb1281d8f7676056413f22d32731638a0cda3272064", 0x87}, {&(0x7f0000001940)="8edffa3a706653baad03561769614f7b94bd1a9f908214a37ba2f791", 0x1c}], 0x2, 0x0, 0x0, 0x40000}, {0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f00000019c0)="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", 0xff}], 0x1, 0x0, 0x0, 0x4000000}, {0x0, 0x0, &(0x7f0000002c00)=[{&(0x7f0000001b00)="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", 0x1000}, {&(0x7f0000002b00)="9d82972f7ffd81fd0431e2869944f10e8523a3f11d45a0f828871f1654d6730abe8c43180f7a8034ef34e1dc5e79359e565810df8556b6927a236c31ff342294ff97b9487c74cce7a27594189dd6ee4aba748de0a389f2050c4b5350d0749b9e77bb9648014d4a5558a5", 0x6a}, {&(0x7f0000002b80)="ae99ad1bb1b4d3288c92c38e41df6db48bc9ee51c6820bcf4a6b4af69d5a360a4eed42a00f42f978278db6cc6e175da5f9665a49475b8d47b3558f39b9707ab1b20a3357ace69a1092c0cc1c7985ab4d689c3e3bd603ef3b3d1ee4be1381", 0x5e}], 0x3, 0x0, 0x0, 0x40040}, {0x0, 0x0, &(0x7f0000002cc0)=[{&(0x7f0000002c40)="e930de8496b17690f320e09f238418633000d0aae4c56aaed1e4e706b9cf8830774d208f744feb783bcebd16646f24d600815eb4d4200f89c3ab8f7b8f394e0d56e76a5604ecda42ba8c2cd060a64b7dba0ef48f035969eb16986aa1a0cf2544a344cd5fdc3241bf08d8bc60c2ed9cd5d8ac140a", 0x74}], 0x1, &(0x7f0000002d00)=[@assoc={0x18, 0x117, 0x4, 0x9}, @iv={0xb8, 0x117, 0x2, 0xa1, "a6e514ab01a28cb040b55e066695927b8687096a9def0f58d2a9fed82bdec8b39544507c1688fb700c6199fc7c1b0d80a10ecd1982a9191948eefb26d3ce46f320588173fccdfecf57b26701038fbccadd12d65fbff425043b845eba5dbc4d8e1c368f263a136ee527ebf409b905bccee39e83b412a6678fb0508bc1e30bd2fa0b224e6d566387cde2243318cc43ddd86b44575c906783988649817e1a35d72605"}, @assoc={0x18}, @assoc={0x18, 0x117, 0x4, 0x8}], 0x100, 0x800}, {0x0, 0x0, &(0x7f0000002f00)=[{&(0x7f0000002e00)="801e6ab8bacdc6b9b03c5ecf009bbfd43d0572822c9a44369744", 0x1a}, {&(0x7f0000002e40)="55f38178dd18f8629b2e9c648c1474d734de525c339008e936855479346b221ee33730fb60a374344a8f0d5d2942d1d8a7fb61d05acfb0a9d7be733e8ebde8ec22a4e9458d883cd0a24e3a81a958b2d81b7eb0918ab444e6cbdc688a1b44ee4333ca34845df3e675a5aab8f20d5ba164363389f185b4a94d3cdded93df1b4abbc008faf607156bd4bea26ddb8fe33245bde31f21b210c4999fd9", 0x9a}], 0x2, &(0x7f0000002f40)=[@assoc={0x18, 0x117, 0x4, 0x400}, @assoc={0x18}, @iv={0xc0, 0x117, 0x2, 0xa5, "bd8c2e4860a62dc493805bf2599fa15143efdb1c655519ebc78d6dd6bb24c5435ac6bc04662210c674ee0c7cfee192c9d9a77c8b7c945b7daabbacab7ffc5d9b54e25e169e317d9406cab820570c028fb42c9a0c1f807ee7bf3a0387696d7074211046d38385d1060e8e8f8855bb0e3c87112cd80734aefd40f9fbb7bb1a6d5a3303f453963157c070b08fed70184c24c19867a7d9295a15a47adf3a6d824deecdc80cf642"}, @assoc={0x18, 0x117, 0x4, 0x4}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0xb8, 0x117, 0x2, 0xa4, "309229733f94e31d2ffd64470a2beb6a32e6789793619034a57d7e6718b4fbf7773ce34893ee98a3fd24f8d47bfccdbcf0a0d4b3fb9993c6ab891ca9d371225eb8ccc64ebc11c26996439db127f81a5952df28eea4be5eb17e7e19d282c1ca0dcf572ec0b06ead99a4e054c5742089e3fc75e6c815b9c65cc5892326c9d216909a173c81d0ba9af247005c9bef85273599c10bbb969119a1d496730616a111b042b422e6"}], 0x1d8, 0x4}, {0x0, 0x0, &(0x7f0000005200)=[{&(0x7f0000003140)="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", 0x1000}, {&(0x7f0000004140)="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", 0x1000}, {&(0x7f0000005140)="a7937c74023c354814832e6ec428f9723cef31b67f71835ca09c5df0a3846eb8542e4254e6feeb7cf22096fbacad4d01d9016c6169132f9310a9f7601655a67c5a2943acf611a24821db5603f25de901764909a46b511da464000900fcf59464766e4eddfd193b43ca", 0x69}, {&(0x7f00000051c0)="d4ef8153eaae9cff", 0x8}], 0x4, &(0x7f0000005240)=[@iv={0x1018, 0x117, 0x2, 0x1000, "e5df414bcfd552c4bb1152825a41ab18dbe8d514e71e1e2bf12510dc03e349006f176db0ac4e0870b4380fc87288868e4a72e573cae8c219a53e63d0c9d33f1b3bd794c8cba94b2e1f72ebe03a4622e7925f09034a54f93c47362ce891176cb856259a4ca49f136e1b3e55feb64c99e57e673d0eff73e993b499514d484901c2ae94307ff0b0323a473c3acfbfda28b1a50b1592fe085d5f3d3c1af2bffd40b98535f75051c9868c57cc1bf662a32aa63107d5e71d1c156643e2ae05cccf74e98790eab6b2b5ae35b63e06e5e5765bb349b14fe7cef522defeb27e2c6cbc78adb0d2d6023052ae6f4123d6280fe9af2e002f9c2414880297b171e875c39270d52ca17cb496d712536de4b3ef0890139280139d8378aa2bbe4de1ad053c5ef922d160925f630450608db8c5d9dd6805fefd15ada47f164d9d828437af0282f17663e856c52a8cd57832d2d852d0d751e080efa71a04050ee025b1af43b6b17308d4787417efd36b8078e50b3cff4ee9cb23d8b14b47e797b2b1bd3e9ab95e37ecf8729c4b53ff760dea317b45b5d878e1d397b9c368ddf728ac351e4bb4048d599578a88149d3c3141ada0eb3199d0726378da88d03ffe4a89ac03fc9543ec3d3abacde66183ae5507f4f23d213245936385ebbc32d2511870543699ddb39500038ecd8f55075889e5200eeb4748140a71b75facf756d42df25c1945985af850c1fa4b40adc69b644ec9870d4f2b5b306d0d84ec9b66fd87eb5d6f8e282183a0af297684400d2d36f6a43f34f4e5e3a4f25c4be7b61d94d5a04f909e37e41680efff90a4108f6859c7a809d72f3cc90937f38d7d819143b7178c77d2f2a152436bfc13b77ef56cac9f278340a8562ca4ff0aa8c5b360eff5da688c20f20494e59e391885e9a4f584ceac186b1223fec815edee6673315191b4b4d014518f5f4b4b96760846cb30b169a97155991d7ec1fb99f7bf2d6420f0a4a47c29fca86565d4bd2d94d2d176d00e7f0bff516ee23413be9bbded901cd99e9d09d6c1b14e707cb69deac745f5f59c43f13297804eaf60b4e7fd6fdaed5c6da6df3aeb2b43ac5dc13c54b99fbf99aac41b8f7fdb056b714f48bd226f2d0fa279a9e3ca3679f3b96ba8e007f64a58ebcbbbcdd59ddcc83bc427e373922b0d222e86f5f0cc70bea22fbc7eece10488f7edb2118cd2d70693e9b1e1fca0b8e370d63f6600564a2bd34fbed6eaf2b68a8562cb686bf3da7a44a5d45b3211b1417ab9f7d70687e849cb0820aef60866e8c156c629f7725474b6e90350875e7ecdbd02171883414b6506ab5a311f4098e4cee249fd21c69d574a46081648a7a9431c84adacc0a05dfc1982db66bc642c288f05584c2edb4517935fd1e2034c4c91fbe258a78544dda1cb4d8340ede500eb8ca6516524494f5bb9f842c46896b880b8ee38bc72d055d806eb4d0c9aac1c2efa0e9210c4bb9da725284a1c94b7ea3935aec0b0d35c1830264f35ba30c0c424f494a6cb161fc9dd899527dbc2590ecabd226589816aadd04709438cfacc2c003d3109de3e14c6e275f1ccb3c5b10f06e511335a7c8523a8f0df3a6fa89814f7ad07d37e816b86a729582c4a3de87a91d7f4f0f389ff9489a3cb2a14586f58a7e5b9eefcccfa2cda9616efe6cc9aee173851f4fe0e1e034464579d23dfefa84665b6d946555c5a83588418dbd252f7a07136b53c9e740a09436e0d771bb554386a9fc545f2ed555cf6b2488ec79c5a06911b265a40b3b0e340abe5bb86f8d11b3e044d7adb741cf39fa9b3f6724f86b5a06ccaa2e473949ae22ff0898fa948223a3a33c1d9e1a25161feaa6a60bbacb0d376388ec92a21626452bd1cee0b87e8a8319e121fb5902beeb20d134a5daa62c20e6b788c54804684177fef21b85e9b1ebe64fd09c01a0e953f06b367e81889b71c6bf4f981c114a3b2568643855ab9daf090a32571f0a4e8498c5cdec597c77156ebada4fb6f3012c24834308831666d83c2c68166b7c04dcbbe9db6737c7ac67cafdfb93db8df0a5285dcc7d113e5f4fa7381c0e514972e263999d488c3291c951ce99c9f782dc3075b03de88ed8d133caf212078fe5ebf27b94f98ccf6dee25276dbdddb27105527614e973e851b6d57351dcca52877dc53fc6d0a05c68e1d551cc0bc16d9139ee9eac3371b2445a7ea59ec6981daeee0fa46493128ec64a6d7e7047237edbbd43d6566ce8ce43bb63bb2576a1e41b4c24644c0693aad73cb00e92366fd576b7971f2fb085b49371923639fb1dbb03a3ec6dbe875ea491779476ae7dd6fa820f9d23b915f74171288492d30b09738f63cfdcefb3e3dbe80689ba1640f4db216e41df3cd2d92fa8c6c2821f1bd7ed8e8d53aae1a9d4f42fe98c31d44312f470ed98148a969d283a9bbd05aede470102ec0c7064b8dd6d7f8f72844f006f49e15665885e221f9807020f013ae5523469185ff5188ec592ab57214302910b4f29219d94c11aee174ec88d15f33c5fab5bd27450e2de98545cd7d5245432bcfe99cdf6987dc5cb24c3c44f6ab622d06aa31a7b7c5bd263ecb958c5d16f850739b2e4cee7161fe856156f46c2dd9e1c784e46e2ccc2cf328937546dc85f30b2af19260a801cbc94a45eb88187bb49773e0f7152d68753a8f10e993d3d658135676a26a2f506b81ce0c7341bd1944d97fb10a2fa44cac4d0c24ea88b0d7e66ad1f9ad48fa1aad06c61666c206bdc1199f79a0d8e1313e2ac7f5cc9ad790be564db55d004519dfd2fbda51acfdb027045b3dec3dd044a091825c4ac617d5446fb594c3d1275d59c0e880b2f987cb7a61f799865ef2a554b7b9c101d70cadb899b4535963de3392012dbf884944eab19fc885406dd87702951b6c4b6928a108617ed9b00fad11d5fefd6b3ab7f0d41638405717b308f36c652fdb68d161e037f195246d48f2bba44603bbdec22b8e47714ed24a46063e0a2ef55453b97b47fbb508e7ea0bcf7b635b8843f0cc7bfa52a83392cdf66d150bc18fd86340a4d927db70877fe0fff0af805ed4b8d3fdb03fe9ee3567acb07881847e22b35b38b18b7cb72b8547850b1b393137db263b1841f4bc96cbe39dba83d7a449e177ab2a14be70fae312dbdc3999640f0ee00e67529a1687f423dc3d9fba1c0353a917d59d86bc8c37ce79719414a894e493e35885dba8abc1c190229b878f68f94eaaebdab8241e8da442cfc2f7a2462d3a090e6b37729d289411e8c0e1541c484b56891be0d6c76ed1a681e0d518c5182bb416957881adaa8715f8afbcd6f652530ce0eb1ac655cd6038fb2555e5a00c68e500355b4836ba6caa8ba7fd60c93de302549efc73e0fc239217dcfba3d1dd2508af0df67ac61f3f19fd54e89145b14311cf261281c062277e4961ce1dbc2d69ec07063e75a22f27a6bd16de5be45105fae600b3851c72561e126716f5c5271f79029352f19b99b203b20e33cca68eb7ac3e236cf64ef773e55983de2d9fc1f9e36fb1889f6810108b5116c8aa5d92e2b6668aa900c8f2138447cf5db68f5500b25caf0d47b6abdc0b15cea049832da57bd9c367d545f4cbec4d2951adf63af00c6c057a21c4e77ed580ea9afd6ed104cab754a8fccf9d7dade1bbbcbbb5c9460b8d9d772ec3054f1657137331638b3ff108764b0d557ec1e47fc9884d99ffea2e7752d2b44cb4b0159da2df16f7770906ada9e9be91aa88a03c9cd5bcf90272cdb3f46781b44ec4aa94acf867ef4b05d601108cd03ad5bc40fffc5243dc0db22737f7667999737b2adaae91a9768d8f4a14089b62e2eb21e35af31a9a2ab68c9432575f85df62888428415c6b497e926774c7ac3aeba7692d770d8677bd630aa20ed6570fb4356498f12b03a680d066d31b3b32101f4900013ae1659d53318092f64078de7865a28c05cc3d7069ea8db23dc95638ccfe30e7264effe814a968bdbdde7ffea12982867014dd9b9f6de61a212a866514e7b35b1f1a5e9a0c5eef6c2d416b30e0f379bb4dabc7c00f5ed11ba90449f366817eb0ba7bbc1825f77e9886e41ee6df271ee47ff758f136d89ad6093f86f131e0f77fe89555254421700761d51c86e725cc61612de0e20544690be9a4db2ee095f5468b79c5cd800aff2c6b89a22a7ac1ebb4f0bcd348a63f0aa30242cdcc3709bc6640309431a5df728f7f7f40d21d5f85bd9b5863d3d81db8e1232ecb4071f2f4906113e53e487e8731657b42624a1ac156825faecc390084c9c821681771ebb3ae0acf38cfc3eabc7dd959a0e44f46ffcd18193d59fe692c76a3b9d58550ce73b4f32cc1f2a78963905590caf1c28f01e2e55a0b9666cc5596e12ac4cef6151edc0a4e426d6d995145dbb9b9ee8525631461d7b4ac2cef0545f6d65234230477b17a9b62571510112dbaa64c00af428c847f6ab54f35db63485beec964dbab035c1dc1a54f3c26e506db73614bd8a0c6885a7392c40648fc376c0ad1dc2454d3be1d2dd9a6bb4b5fe69960d39e242fac4c5a0eab3948c00c0792b696f7994ca65b8e78fa6d48806d8205e4f70a70f72f5a192f578ba8bee61029693de27c95ffc24a61056ce64aeb7ce58ab08f8f46ad894d698bc4795e448851e24b7d38066bc152d4937ac9fb27bcc13e9b019aed069e4c9c68bf5d5334d08674bc93cf712a4ac032a368108afd5ede033fa4e7d9429c064f981b7139e0e85801cba6a92bac78f06bd1c909617e547d382a79045abe10071df4d33dd47c7c810dc9d93785269df5d77507ddbd820b866fb4ca99c5908d8da81bcc31a2d24ee710df190ed029b2d36f42c9f89e992126dbdd6a9e6e218370eb6d34bd1241062151e876339c0be592a91daf12e5b51978d74bb2dfae001159e4ede8f58c56f8fae3643a1fa2e066c80616d120c75882ebb1ad762ea8211652d77a3145d35666c18cd638fb786707ff6e44abbd28b647f535f0151838f760e03b530aa15f46d521b0b9a115848d38f313270bdf787ab011f40cc63f23cb5c7e262d39a9d49e39ff8efad21b575356cee0ce1e9ecfd2a44fd746c9e3552eb59324167b75d97c108da943b1a7dc79b3bfeb8dd089f87b56539a6415c17a722ed89f381ac99e3b3675e55f9c64b7f8b8df4fddc8bdea4245c621e2191027524ea723317370fa2425b55bf505991d8a83aa5faab355a54327efb212919810c31f0cef05b9964e357a4bfb9ac38fad4a3bc1b348cade1e681cbfeb406daba6a06dcd57554a8e282bbbffdb0b6ec7476f8abcbc3c02f906ba11af36e4037cac275fc17d454cac941fb461a526891132044ee80826a6582ada31da22d8bee9b1f0c18b82224ae4a9502252c7121479ebe7148ec9d20e55f145e035f54eedc0c1d0d737ae4c7fdbdb701d66b8fba602d58f49c5789365ba0756941ef6997bd93ab16c86266c76cd74dffc1d8db9b36fd3276926a8810cc6615651ab3e28d2f84565c71d4bbff73ece80dd48af17ac2c2d3bd5036c19f205f14afc6510e6fa896b564545380f2b1be2cac8ca82c5b18a4a7212715a8b41fe6e58f228f500dceedba980d3326b2bfd468d9b29bb58cbcd4499b37aeea81f1b04a2a2a27674af1e3dbd4149b68686af4a8ae92a89b477e2c2349645326f22f80023a21ba4a5953457c4fd22c8887db5cb5591328e5fe2e3965efacf14473deb35c536803f1fb4e742b5752a554cd3c8a9310b93b2a90c4ae597937a99313520a9c2d8f99e89e1c27a0d30f97ca2c78aacfa30d3aa3f6e80b13898ed4e7f7d37245e6bdf042f1a5e33fbe2113fa9d949107e1810f52f84e4303"}, @assoc={0x18, 0x117, 0x4, 0x2}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x1}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @assoc={0x18, 0x117, 0x4, 0xffffffff}, @iv={0x88, 0x117, 0x2, 0x72, "e22ae05c7bb6ce7d338c622b86f3572c9ecbb88a71a49615a9e964f81b4cd132983deeb671b2e56a3d69b0e43c8af84e91279bccb985d8bd1554cab62bfa470a9d8e8cfc5326c3ad73ecf9b1d1e90d0e7f092c08f51ccca10ae946973c3625d57a89be3513a76c7f9e915f7f38e17252651b"}, @op={0x18, 0x117, 0x3, 0x1}], 0x2130, 0x80}, {0x0, 0x0, &(0x7f0000007440)=[{&(0x7f0000007380)="166a3608f75b0e4a0437c39f98214d78edccaa71268b66c8e7e3007e416a6d2ec82518ae859e33aca6388611695fc3212b10dfafb65fc410a127bf54bb9415ae86e6a5d68ea8bb3255c92f659b32fdef5985755faa4809fefb5600dd9fcdff82a258faba610353f837904d97895c06", 0x6f}, {&(0x7f0000007400)="6e99799cc23d392abe8af22e47ce50e2515c1530ec8303ce5300e35d", 0x1c}], 0x2, 0x0, 0x0, 0x20004000}], 0x9, 0x801) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000300)={0x0, 0x1000, "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"}, &(0x7f0000000100)=0x1008) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e21, 0x40, @mcast1, 0x8}}, 0x2, 0xdc, 0x4, 0xf273, 0x70}, 0x98) 17:25:01 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x80030000000000, 0x4a}) 17:25:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000f00005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:01 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:01 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x11e0400, 0x4a}) 17:25:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000040ec000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:25:01 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:01 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x80000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:01 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x284d1}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:01 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2200000000000000, 0x4a}) 17:25:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004100000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:01 executing program 1: sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:01 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x5c0200, 0x4a}) 17:25:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004080000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:01 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x2660f}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:01 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xb, 0x4a}) 17:25:01 executing program 1: sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = semget(0x1, 0x6, 0x200) semctl$GETNCNT(r1, 0x1, 0xe, &(0x7f0000000300)=""/255) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="a2"]) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:25:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000085e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:02 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x7, 0x4a}) 17:25:02 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x2e800}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:02 executing program 1: sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:02 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x48001}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004fffff0005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:02 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xfdfdffff, 0x4a}) 17:25:02 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f000048a000)}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) [ 2511.364295] *** Guest State *** [ 2511.373660] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 17:25:02 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x7eff}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) [ 2511.404596] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 2511.419877] CR3 = 0x0000000000000000 [ 2511.440825] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 2511.451803] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 2511.474439] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 2511.482565] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 17:25:02 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x8b96}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004006b6b6b5e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) [ 2511.497531] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 2511.508191] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 2511.521395] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 2511.562253] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 2511.576486] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 2511.587971] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 2511.596758] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 2511.605351] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 2511.613649] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 2511.631802] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 2511.651870] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 2511.659931] Interruptibility = 00000000 ActivityState = 00000000 [ 2511.666638] *** Host State *** [ 2511.669936] RIP = 0xffffffff8120495e RSP = 0xffff8881bf3e7390 [ 2511.676127] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 2511.682691] FSBase=00007fadd5af5700 GSBase=ffff8881daf00000 TRBase=fffffe0000033000 [ 2511.690871] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 2511.703993] CR0=0000000080050033 CR3=00000001bf189000 CR4=00000000001426e0 [ 2511.711578] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff87e01360 [ 2511.718432] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 2511.724691] *** Control State *** [ 2511.728260] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 2511.735151] EntryControls=0000d1ff ExitControls=002fefff [ 2511.741598] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 2511.749614] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 2511.757866] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 2511.764775] reason=80000021 qualification=0000000000000000 [ 2511.771251] IDTVectoring: info=00000000 errcode=00000000 [ 2511.777325] TSC Offset = 0xfffffabcfb72f611 [ 2511.781819] EPT pointer = 0x00000001b38d901e 17:25:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = getuid() mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000200)={'trans=unix,', {[{@loose='loose'}, {@access_uid={'access', 0x3d, r4}}, {@cache_loose='cache=loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/kvm\x00'}}, {@subj_type={'subj_type', 0x3d, '/dev/kvm\x00'}}, {@smackfsroot={'smackfsroot'}}, {@dont_measure='dont_measure'}, {@obj_type={'obj_type', 0x3d, 'wlan0em0bdev#em0*'}}, {@pcr={'pcr', 0x3d, 0x13}}]}}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000180)=ANY=[@ANYBLOB="53cf"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:25:02 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x968b, 0x4a}) 17:25:02 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f000048a000)}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:02 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x700000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004e00000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:02 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x200000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004c00e00005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:03 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x12, 0x4a}) 17:25:03 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f000048a000)}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004ffffff9e5e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:03 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xf}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x9, 0x519080) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000140)={0x8fe6}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:25:03 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x80040000000000, 0x4a}) 17:25:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004004003005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:03 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:03 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x166020000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:03 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xc00000000000000, 0x4a}) 17:25:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000049effffff5e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:03 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x284bd}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:03 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x180020000000000, 0x4a}) 17:25:03 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000105e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:03 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x800000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) accept$unix(r0, &(0x7f0000000200), &(0x7f0000000180)=0x6e) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x100, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) socketpair(0x15, 0x5, 0x8c, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PPPIOCGCHAN(r4, 0x80047437, &(0x7f0000000300)) ioctl$KVM_RUN(r3, 0xae80, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@ng={0x4, 0x12, "d7"}, 0x3, 0x1) 17:25:04 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xf660200, 0x4a}) 17:25:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000040000000f5e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:04 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:04 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xff7e000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:04 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0xb000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:04 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x700, 0x4a}) 17:25:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004fffffff05e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:04 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:04 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xd184020000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400f0ffff5e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:04 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x10, 0x4a}) 17:25:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00']) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:25:04 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x800200}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:04 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x4a00000000000000, 0x4a}) 17:25:04 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:04 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x968b}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004fb0000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000fb5e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:04 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x800400, 0x4a}) 17:25:04 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xd9580200}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="eb9113"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:25:04 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x4a000000, 0x4a}) 17:25:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000025e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:04 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x5}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:05 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000100)=ANY=[@ANYBLOB="cb55e696027bb5e597375543a20703a70c119cfdd538bc7a3e13eb582d2d141832092c29ae563b2fe8a6a0913d43b9ef4a52a4eb61aa8e77c6a8d8a580ef5870ce3818b533317f54"]) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f0000000000)={0x1, 0xffffffffffff8001}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:25:05 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:05 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2800300, 0x4a}) 17:25:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400f000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:05 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x2}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:05 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000300)={0x7f, 0xfffffffffffffff8, 0xa, 0x0, 0x0, [{r0, 0x0, 0x7}, {r1, 0x0, 0x2}, {r4, 0x0, 0xeb}, {r3, 0x0, 0xc6}, {r3, 0x0, 0x70e80000000}, {r2, 0x0, 0x8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x400}, {r1, 0x0, 0x9}, {r1, 0x0, 0x101}]}) ioctl$KVM_NMI(r4, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:25:05 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x800000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004f00000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:05 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x7ff00, 0x4a}) 17:25:05 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xfffe0700}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400e000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:05 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x80040000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:05 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x80dd020000000000, 0x4a}) 17:25:06 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400fb00005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:06 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xbd65020000000000, 0x4a}) 17:25:06 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0xd00000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:06 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x8204}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:06 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x200, 0x0) ioctl$KVM_NMI(r1, 0xae9a) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) capset(&(0x7f0000000140)={0x19980330, r2}, &(0x7f0000000180)={0x8a, 0x2, 0x6, 0x1, 0x8, 0x9}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) sendfile(r0, r4, &(0x7f0000000200), 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r5, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 17:25:06 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2800400, 0x4a}) 17:25:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000015e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:06 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xe80200, 0x4a}) 17:25:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000046b6b6b005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:06 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x1800300}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:06 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x43800}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000340005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:07 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x8780, 0x4a}) 17:25:07 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:07 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x8085}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x80042, 0x0) rt_sigreturn() r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') r4 = syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0x0, 0x2) r5 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x6, 0x18001) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) r7 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/mls\x00', 0x0, 0x0) r8 = syz_open_dev$vbi(&(0x7f0000000540)='/dev/vbi#\x00', 0x3, 0x2) sendmsg$NBD_CMD_STATUS(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x60000200}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, r3, 0x408, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x3}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x0) r9 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x9a2f973f7438e3b0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000180)='/dev/md0\x00', 0x100, 0x0) ioctl$TIOCGSID(r9, 0x5429, &(0x7f0000000080)) r10 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000100)=ANY=[@ANYBLOB="596df18f23d3312fa7b6f1aca90ed05259841969036d0042030000001b6cdbfda3d2dae255f2c3e21f95f49b3c96146640a84284eaa5be6481e505800000000000009b3188773f3b06180000"]) ioctl$KVM_NMI(r10, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r10, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r10, 0xae80, 0x0) 17:25:07 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x5c020000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000040000fb005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:07 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x7f0000, 0x4a}) 17:25:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x101000) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0740a4b968918535928686bc8b7bbc6a6475e5fd70a96d2835e3f7958a34c6f58dcedf49f0406a774df73f05d6cf464e51137e5674a1cf2f9e2d29eec744061b41f330e93424d1072954f0a1112bc611aa229bd575f4e8bd55dabbf41e7dff72829f32aa2a0232e10e86956e7639f55d2768474e8e61380a7347e21eced03901a178f0b95f64b9d0f215365c73ba5c3ec3968206ca86c837e99ab19dba22910dd746bfab47fbec17af94cce8d8a850afa06afeb22994948dafb151646306c88190c01d0442af3487bded1370a21c51c7906833d79974cc75c2e4705b93c80de8da06a4e73276c96b090920"]) fcntl$getownex(r3, 0x10, &(0x7f0000000100)) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0xaaaaaaaaaaaab73, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) fsync(r0) 17:25:07 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0xffffffff00000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:07 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:07 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x200000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400000000fb0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:07 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004002719005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:07 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x10000000, 0x4a}) 17:25:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000100)=ANY=[@ANYBLOB="06135158dbf93f090000995a55337c9e6208cac78473c075883ad15e1c0e3b152af742df6c76d3cdac08a3d730184e68b2000000000027fc0c3608f4190a44641f7d03f4b35f0350231c233c628a07e4b2908dd70f9dafa7dd102f7fd177f37c69d859f52e73927ab788d8d337905fc38c8f7221b7dec5412b3e96a375972b09ebb434374433a0b0608d32dfce43532f0f40cbf2c78017e22ef754c51cc7f47a48c9"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:25:07 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0xe8020000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:07 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xa00000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400fb00005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:07 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:07 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xbd650200, 0x4a}) 17:25:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004001927005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:07 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1860000, 0x4a}) 17:25:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000100)={0x1f, 0x15, 0x0, 0x17, 0x0, 0xffffffff, 0x2, 0x166, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000803}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r3, 0x100, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x4, @media='eth\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x48004}, 0x40000) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r5, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 17:25:07 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:08 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xe80200}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:08 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x1200000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:08 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400f000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x0, 0x0, @pic={0x3f, 0x1, 0x400, 0x5e2a, 0x3, 0x8, 0x7b, 0x7, 0x2, 0x1, 0x2, 0x3, 0x1, 0x46bb, 0x1f}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:25:08 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x880c, 0x4a}) 17:25:08 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x0, 0x0, 0x0) dup2(r1, r0) 17:25:08 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x1800100}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="cb"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:25:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400e000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:08 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x8083000000000000, 0x4a}) 17:25:08 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x3f00000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:08 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x0, 0x0, 0x0) dup2(r1, r0) 17:25:08 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x280030000000000, 0x4a}) 17:25:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000800005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:08 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x0, 0x0, 0x0) dup2(r1, r0) 17:25:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000200005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:08 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x7000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:08 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x800100}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:08 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xff0700, 0x4a}) 17:25:08 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000003c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda, 0xa0008000}, 0x3f00) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) 17:25:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000040000f0005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:08 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(0xffffffffffffffff, r0) 17:25:08 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x600000000000000, 0x4a}) 17:25:08 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x25806}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:08 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x12000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:09 executing program 1: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, 0xffffffffffffffff) 17:25:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000040000e0005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:09 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x80dd020000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:09 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1115040000000000, 0x4a}) 17:25:09 executing program 1: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000400)=""/19) 17:25:09 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x5000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:09 executing program 4: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0xd00000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000ec0005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:09 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xc880000, 0x4a}) 17:25:09 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x1000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:09 executing program 1: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x1800300}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:09 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xfffffdfd}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:09 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x44000, 0x4a}) 17:25:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400000000fa0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:09 executing program 1: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x80040000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:09 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x166020000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:09 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x38600, 0x4a}) 17:25:09 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x1800000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:09 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000f00005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:10 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x11150400}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:10 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xbbdf000000000000, 0x4a}) 17:25:10 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400c00e005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:10 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:10 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x8}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004001000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:10 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x700000000000000, 0x4a}) 17:25:10 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup2(r1, r0) 17:25:10 executing program 1: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x8}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:10 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x800300, 0x4a}) 17:25:10 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x8087}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400000f005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:10 executing program 4: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xd1840200}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:10 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x41511, 0x4a}) 17:25:10 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0xbd84020000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:10 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xe}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:10 executing program 1: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x11e040000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000f05e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:10 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x4156a, 0x4a}) 17:25:10 executing program 4: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x7f0000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:11 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0xbd840200}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000040000fb005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:11 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xb00000000000000, 0x4a}) 17:25:11 executing program 1: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x1800300}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:11 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x28000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000008005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:11 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x484000000000000, 0x4a}) 17:25:11 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0xfffe0700}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:11 executing program 4: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x968b000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:25:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400000ec05e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:11 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x8087000000000000, 0x4a}) 17:25:11 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x3f00}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:11 executing program 4: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xfffe070000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000019275e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:25:11 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x2e800}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:11 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xe000000, 0x4a}) 17:25:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000040000f0005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:25:11 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xfbbf0000, 0x4a}) 17:25:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000027195e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:11 executing program 4: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x860300}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:11 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0xe00000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000040000e0005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:12 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x28001}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:12 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x38002, 0x4a}) 17:25:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) dup2(r0, 0xffffffffffffffff) 17:25:12 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x8b96, 0x4a}) 17:25:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000010005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:12 executing program 4: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x2}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:12 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x1660200}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:12 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x7f000000000000, 0x4a}) 17:25:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r1) 17:25:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r2) 17:25:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000040000c00e5e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:12 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x40040000000000, 0x4a}) 17:25:12 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xf66020000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(0xffffffffffffffff, r2) 17:25:12 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0xa00}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r1) 17:25:12 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x1800300, 0x4a}) 17:25:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000fb5e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:12 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r2, r0, 0x0, 0x7fff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x9, 0x3, 0x368, 0x138, 0x138, 0x138, 0x138, 0x0, 0x298, 0x298, 0x298, 0x298, 0x298, 0x3, &(0x7f0000000000), {[{{@uncond, 0x0, 0xf8, 0x138, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0x5e, 0x2, 0x2, 0x3, 0x4, 0x0, 0x28}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xe30c, 0x3d, "190250989216f2a60d82249e734f0b02f5eca80b5e0d1ab25b03f653bc8a"}}}, {{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1f, 0x20e, 0x59ce, 0x80000001, '\x00', 0xfffffffffffff832}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) 17:25:12 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:25:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clock_adjtime(0x0, &(0x7f0000000040)={0xb7, 0x0, 0x200000000000000}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x200040, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) bind$xdp(r1, &(0x7f0000000300)={0x2c, 0x4, r2, 0x18, 0xffffffffffffff9c}, 0x10) close(r0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000000)='syz1\x00') syz_open_dev$vivid(&(0x7f0000000200)='/dev/video#\x00', 0x2, 0x2) syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') fallocate(r0, 0x0, 0xdf, 0x1d751a27) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x2, &(0x7f0000000180)=[{}, {}]}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x800000000040, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) recvmsg$kcm(r3, &(0x7f0000000d40)={&(0x7f0000000440)=@ax25, 0x80, &(0x7f0000000c00)=[{&(0x7f00000004c0)=""/37, 0x25}, {&(0x7f0000000500)=""/6, 0x6}, {&(0x7f0000000540)=""/28, 0x1c}, {&(0x7f00000008c0)=""/162, 0xa2}, {&(0x7f0000000980)=""/61, 0x3d}, {&(0x7f00000009c0)=""/211, 0xd3}, {&(0x7f0000000ac0)=""/62, 0x3e}, {&(0x7f0000000b00)=""/239, 0xef}], 0x8, &(0x7f0000000c80)=""/160, 0xa0}, 0x41) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) write$sndseq(r3, &(0x7f0000000740)=[{0x3, 0xfffffffffffffff7, 0x1, 0x7, @time={0x0, 0x1c9c380}, {0x1235, 0x23f}, {0x1f}, @quote={{0x80000001, 0x6}, 0x7fffffff, &(0x7f0000000340)={0x3, 0xf38, 0x6, 0x3, @tick, {0x5, 0xfffffffffffffff9}, {0x6, 0x200}, @addr={0x3f, 0x2}}}}, {0x3ff, 0x8000, 0x5, 0x6eb5, @tick, {0x6, 0x7}, {0x3, 0x9}, @queue={0x8, {0x8, 0xbe}}}, {0x1, 0x7fffffff, 0x80000001, 0x4, @time, {0x7}, {0xdef, 0x1}, @raw8={"1de44bdc2c49f101e31cc05e"}}, {0x10000, 0x27e, 0x6ce686f4, 0x0, @tick=0x101, {0x1, 0x9}, {0xffffffff, 0x9}, @time=@time={r4, r5+10000000}}, {0x1, 0x20, 0x6, 0x0, @tick=0x6, {0x7f, 0x6}, {0x7, 0x8}, @raw32={[0x10000, 0x8, 0x9]}}, {0x9, 0x400, 0x7, 0x2, @tick=0x8001, {0x8, 0x5e}, {0x1, 0x93}, @quote={{0x5, 0x100000000}, 0xf46b, &(0x7f00000003c0)={0x4, 0x1000, 0x8001, 0x90, @tick=0x8000, {0x4, 0x97d}, {0xfd88, 0x6}, @raw32={[0xcd, 0x1ff, 0x6]}}}}, {0x1, 0x6, 0x7, 0x3f, @time={r6, r7+10000000}, {0x1, 0x7}, {0x7fffffff, 0x8}, @connect={{0x200, 0xfffffffffffffc87}, {0x10000000000000, 0x400000}}}, {0x0, 0x800, 0x1, 0xd03, @tick=0x4, {0x200, 0x400}, {0x4, 0xffffffffffff0000}, @control={0x6, 0x8}}], 0x180) sendfile(r0, r0, 0x0, 0x7fff) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) 17:25:13 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x2200, 0x4a}) 17:25:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000002005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:13 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x8083}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:13 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xfffe070000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(0xffffffffffffffff, r2) 17:25:13 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x38000, 0x4a}) 17:25:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r2, r1, 0x0, 0x7fff) 17:25:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400000f005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:13 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x108000000000000, 0x4a}) 17:25:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:25:13 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x80850000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:13 executing program 4: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x8085}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000040000000f5e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:13 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x34260000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r2) 17:25:13 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x4026000000000000, 0x4a}) 17:25:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000e05e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r2) 17:25:13 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x80030000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:13 executing program 4: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000001200}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000fb5e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:13 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0xc000000, 0x4a}) 17:25:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, 0x0) dup2(r0, 0xffffffffffffffff) 17:25:13 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xe00}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400000000fa0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:13 executing program 4: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc000000938c0000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:13 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x3a}) 17:25:13 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0xfffe070000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x0, 0xffffffffffffffff}) dup2(r0, r3) 17:25:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400000000fb0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:14 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x8}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:14 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x1b}) 17:25:14 executing program 4 (fault-call:5 fault-nth:0): sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:14 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0xd000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000085e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:14 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(0xffffffffffffffff, r2) 17:25:14 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x49}) 17:25:14 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xff7f000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a50000040000000f5e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:14 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000040)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6, @in6=@local, 0x4e24, 0x101, 0x4e23, 0xffffffff, 0xa, 0x20, 0x80, 0x3b, 0x0, r2}, {0x2, 0x400, 0xfffffffffffffffd, 0xffffffffffffffe1, 0x7ff, 0x3ff, 0x10001, 0x2}, {0xc8, 0x6c7, 0x9, 0x1}, 0x80000000, 0x6e6bb1, 0x1, 0x0, 0x1, 0x3}, {{@in6=@loopback, 0x4d6, 0x3c}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x1d}, 0x3505, 0x0, 0x1, 0x1, 0x9e, 0x2, 0x9}}, 0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r3, r0) 17:25:14 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x2800300}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4}) dup2(r0, 0xffffffffffffffff) 17:25:14 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0xd}) 17:25:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000025e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:14 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x2e}) 17:25:14 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000040)={0x300000000000000, 0xff, 0x10001, 0x4, 0x5, 0x6, 0xff, 0x1, 0x2, 0x3}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r2, r0) 17:25:14 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xff7e0000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:14 executing program 1 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:25:14 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x860300}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000e05e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:14 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x7, 0x2) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) dup2(r1, r0) 17:25:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:25:14 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x1c}) 17:25:14 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x4000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:14 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x26601}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000105e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x10140) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x81, 0x1, &(0x7f0000000080)=0x8}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r4) 17:25:15 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x5}) 17:25:15 executing program 4: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) r1 = geteuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000000c0)={0x1b0, 0x3a, 0x400, 0x70bd26, 0x25dfdbfe, "", [@nested={0xcc, 0x27, [@typed={0xc, 0x8f, @u64=0x8}, @typed={0x8, 0x6e, @fd=r0}, @typed={0x8, 0x12, @uid=r1}, @generic="024aecbcd466bcbc5cf1ef88145b922777087c03630a658a3e9d18423b36fba57e34cf29b5ec885041768660fe98ba1a87bc08e4a6c1a7371a96e53c1be617f8daff2f0a5f4e01151314220ac65bbd4e2ccdf48736a2b6aa860bbb1a46084685148e29ce1a2f6d347704da8ea0285dcfc0902842c48e0ed3452d27e3cd68f2afe84ae93ba8dc457f32f26298a34ffa2dcfcb8eaa7860ff3096bb592bb18bc50f0c346ba3bd14d4aee6522e"]}, @generic="aaa9aa51e53cc768e4ba8cabff83bb28a55968625050f255796533070b25991cbe4084204fb9ddc7d8029d637b7555a9792b7173d6b99bcf45c54e16dde241aa863060e5011e98e410f98d7ea8b0ee21135282ed74748ba67784f22c9c", @generic="367a5601aa3675427ce4f08107363713dddde4983bbeae1213abf5abba328e710b8588a3f55ecc144ab5e09d015b6608bb8567fec3b032d8e408f796d49fd1fc6654bb4add526c958e7f941d434a4fd1a1a72907e9a7ad63ca", @typed={0x8, 0x5, @uid=r2}, @typed={0x4, 0x34}, @typed={0x8, 0x52, @ipv4=@local}, @typed={0x8, 0x75, @fd=r3}]}, 0x1b0}, {&(0x7f0000000280)={0x88, 0x1f, 0x8, 0x70bd2d, 0x25dfdbfb, "", [@typed={0x8, 0x61, @uid=r1}, @generic="579aaf10873b5eb8f038dea37a9ba5fc5e1fa1cdd100a0b5ddbc97cd8beae18d2355d24cd7b499f7d9059a55bfe43886fb99bfc7dc7f8881577e0374230f0671ea95c718fbcf2aa48a82d9626e6fcbbc6597d61d664a327ff5bb4d019b22ac8085dbc07c67a40f9d27d6199f9d"]}, 0x88}, {&(0x7f0000001400)={0x10c4, 0x42, 0x100, 0x70bd26, 0x25dfdbfd, "", [@nested={0xc, 0x30, [@generic="b2b82851eb71"]}, @nested={0x54, 0x24, [@generic="b213ee09848e4c567256d722e773b81d94f0ff61409a4a19a6dda70325bef6cd3167284a34bc0301fea421243be8a90a50b56c03830121f2d61d192c7bb3dc27d02364740e0b3ceb5b23add6b6"]}, @generic="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", @generic="ee9659128ee00173e3c61b327eb6a7f934d8dee134653e3167bde46f1b028ce0ad9775874e92f592dee5f052acde86e252", @typed={0x8, 0x23, @ipv4=@empty}, @typed={0x14, 0x27, @ipv6=@ipv4={[], [], @multicast2}}, @nested={0x4, 0x96}]}, 0x10c4}, {&(0x7f0000000340)={0x18, 0x1f, 0x708, 0x70bd25, 0x25dfdbfe, "", [@typed={0x8, 0x85, @fd=r3}]}, 0x18}, {&(0x7f0000000380)={0x150, 0x28, 0x0, 0x70bd26, 0x25dfdbfe, "", [@generic, @nested={0x140, 0x2d, [@generic="e79d125332fde7fb96d3f12114220a780d2881a0cfe073de89661fe2c5fccba81b609fb42c4295d89c3a94ff296dee91f288b96db6fa026dc14ea8", @generic="3f0751a8ee138a16d6b341d4760ae54f1c63002f064dcefee63c8a34c1e2ade6dc6ce64c5832fd5b1db12b89277602b336280ebb17c6d7943b7acb9a983406fd4b4f3a9922f2778f0942386aefe21f8511d2e2cbd3aa975e77a03f2f98a342848cc0e927f3eee30694bb3769b8646f5c7414b4091b829ba5f56645e3a76c693263ffe23a49cca8d0f1e4a1b11085b12bc995f16bc5df5aa6a6a9", @generic="a6689cbfccae21a803b2c685c82397829f0aabffec4342b3fe46e110e91bc550b5ba85068c6dd43d2dc18b8a127a56c3b95f56eb9c3dd60f1ea577c7783028e7c1d2cf1553c5ba1dc000b8c5db121263d4bb78eda01e4de9917b92e493ee52c97ef09dfc261174"]}]}, 0x150}, {&(0x7f0000002500)={0x2108, 0x27, 0x100, 0x70bd25, 0x25dfdbfe, "", [@nested={0x20f8, 0x78, [@generic="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", @generic="55a6e661f410ca380830c500efa26ef913caef85dc6aa49f7b0ff2237b01c13fdca5ffe1044a8d2aa67288e2cd56bbd0f50fdbdc59f742608b5d41028c8cec445bf6c7a924e6fdaa117e6ce029d7cd5c328f089ea6dec06cdeb4973a85747527b67b83f31c48351ae81a1f7c24263846287783c00d7b437ec4e67e0e1d8c319024759eedb62356dc225367b98774d90b9360eea8dbbe28c1cc60563b3d58ba49cc0ae4878c74de47838e7655e9a6f3e303843153d7e31e88efebaaa70d96d1f7f7fe2221212cc6bc21d1a8e987fa7cac3c9f7decfd085c06ba07a40cb1ee9f69cf8d1364", @typed={0x8, 0x81, @u32=0x100000001}, @generic="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", @typed={0x8, 0x77, @u32=0x80000001}]}]}, 0x2108}, {&(0x7f0000000980)=ANY=[@ANYBLOB="180000003e00040328bd7000fedbdf2508002800e5355bce746a42ab9ce6cee7ae1febd3ff47a73642bbc5562528c59ff3650279e042cacdab366e561c7d078e580ab3c6f1c75ceaad4972899cee829618024991178ab9bc1238f253c242fefd0230327551486c9e776d513d93972ce755795768", @ANYRES32=r3], 0x18}, {&(0x7f0000000540)={0x198, 0x3e, 0x4, 0x70bd2b, 0x25dfdbfc, "", [@nested={0x188, 0x49, [@typed={0x8, 0x42, @ipv4=@local}, @generic="ad4d6ed29b0ce0ec0a8f8ea7e4a5955d6aa5f583928c118731f02f93ed71b0c0f9ff3a3ed63511ece4fef5135944e0adaeb30f9bae0713688b26fe1a619998c47c3073c99e60c96ffd6eb5d5191c08f3efde28c268d96d8914d3a3a345d8c3ee3e7fe68c999b8e48ed3a5b6867d6038b19f51b7cfdcfa3ad75ec0c28295ee88c3f142f624582534c908e646f48e69f3c37c43e7860112087fb66f4bc43916cbaef5276a6d07d935f319e7d9eb521c626165cf4f21d3d4b9693212d00073dd35198d5520726fbd92334d5b2627f110ad6ae76089f7fab54621fe1b2ad7c62869456128fd838082fc70dd7b164bf9914a5b4ca0264edad1ee45653", @typed={0x8, 0x10, @str='%\x00'}, @generic="089844ea8408e6095b9ea9344550c7", @generic="57434ae1c77711d49231324a9ab95f1ed53032cd687beca104dde9d9ec56d0f7ac98a032a01daacb954d7a13526cbab2a8e3750e3ea477c794c614f83f64", @typed={0x8, 0x35, @u32=0x2}, @typed={0x24, 0x0, @str='\\em1(vboxnet0vboxnet0wlan1self&\x00'}]}]}, 0x198}, {&(0x7f0000000700)={0x1c0, 0x12, 0x406, 0x70bd25, 0x25dfdbfb, "", [@typed={0x8, 0x2a, @fd=r3}, @typed={0x90, 0x1f, @binary="b932c8d2dcd16bd3bbcd611819b5a9e124e9048b824168671cf1424f3e0146ff0a3f43ac374fb28264f1068364737f9fbfe13f2029153ebb36786082b7eb64e24e09fda4e616b7334ec204c1852a5e34788b49ddc9f5873f0e9a41e0515e409090b92651e39ca17d525c3748a9a5b9490ee358b838be11833f95885a14ef7f0c6e1d2c923a182d5331ecb8"}, @generic="ad5530e4e1d9b057b49e55a29f2409141f52802ed7c88cb3021133bb0b24d56bb3017f323249cf215dce49eceacdaa8d88", @generic="bb37e393c8b67b3f7cbcae3908f850b492ec322bb264ab49c9b0a1c1b52e60185fcdb1d4fe4285ae7cff4b424a098a681fc18b0651942a11c1775948d10d5d79faf63df7ee5c90e3da136ac57f2ba0e8950e55301efb61203daafeb8f1e0a66262649ca2c864cd11ad85e0abbb365281e51429cbafe421e190bca42b9995fbb3d35c5e75abd2dd647868bf8a3cfcb8a11124a0bf3aeb09012483d290010dab802bc9891d58a721c048bd43d7f396a320915e5a1263af5504c0f7e1bd4a6d141048456657a267d68ee357f9a9e6c58cdf26c896a134", @typed={0x8, 0x2f, @ipv4=@broadcast}, @typed={0x8, 0x6a, @uid=r1}]}, 0x1c0}], 0x9, &(0x7f000048a000)}, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000500)='./file0\x00', &(0x7f0000000a00)='trusted.overlay.redirect\x00', &(0x7f0000000a40)='./file0\x00', 0x8, 0x3) shutdown(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) r4 = memfd_create(&(0x7f0000000a80)='wlan0\x00', 0x0) read$FUSE(r4, &(0x7f0000004640), 0x1000) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PIE_ON(r5, 0x7005) 17:25:15 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x2100}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400000000fa0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:15 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x7feff}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:15 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x33}) 17:25:15 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='sit0\x00'}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:15 executing program 1: ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000000)='\x00\x04\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x248000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r1, r4) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x4, &(0x7f0000000380)=[{&(0x7f0000000280)="4bcef91659b8b235d1d63d11ccc3fa7d5d7c965cddbc589be80f826fb843a7aa03dab9599d531c8e435d9b9cecee539084e14028e2fb0cb3d894b4f40e2cc139cfdf1bff8eb589e110da329f5925bed62b5902fff3321719c7745c575a17f337e53a35019560caa558cbd07549e3134bbad41eb721945b58cabc31bd86d2cb399ec53c314bb2427d2bb80668da26b8df6c2a3eae428b96935ca99ebed2c30e221aeff6d62beb4021261803d8ffcde404d611b5c0464db8dafe1154818c6b892535b14e3d1ebeb723ae18e7", 0xcb, 0xfffffffffffffff7}, {&(0x7f0000000440)="1a424306f0ad16ffb10c2fd105c002417c925861dd57062f52edc8b06d82fa2f01b7a1f7cc1e70f29536eb1361e02e628b82eeb5775ac40dd632ae61ea32acfc31e3276f3a170a6c2755cd87cbf3ee11f4faacbfde1ef3f54a35e3a70dcd8009af721a63ea4a1dc04763799f9b1fb75591df8d94adc8a23b098534073bec98b9180f0c1daed07ba19c8c73d6e74b24bc93f4879669968e96fd305120f7adae136f39b86aab9332e9", 0xa8, 0xfff}, {&(0x7f00000001c0)="74cc8497b2c534bf1dedde24463afa1bef049941977ead7b0c411fe2e0dc6c5a0ea0cbf46345a628d4ab54ca59f453a705c191be96f950996e1b4d5d78de6d17109df17d599219976808b67e3b847af2e0ebec0d751790e63035", 0x5a, 0x2}, {&(0x7f0000000500)="5f894a2c5e08728d8afd16d634e904562701104f82efac8ad06c1084e6d30c6dc8121b68cfbfb068741a530fc09d76945b141bbbdcae3242f1f7c569507c1bf3498deb0f8b3ed83c66db69dffc55dc33a0876e52708451878a5252566f837a5b8888e6ea29ca3b88b7aa310c2afe3b00b8756f5f3b27bbb481ff530ae5af13d1c141ee840e8c6e5f87f03363e1819a4f4c227f7818fe4f40d7fb23d16707b1c35547ae082ecfd512ab0f5dabf1f63756807f5c2b67b942ebdf26ae04613a89d178e5a91bc91d07a0cb184a3ce2db608d25ba9269c09d013fc7e33a048ff6e807cf67ea8a676e9a7c", 0xe8, 0x80000000}], 0x10, &(0x7f0000000600)='user\x00') 17:25:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a500000400000000fb0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:15 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x500}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:15 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x8083000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005ee000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:15 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$KVM_SMI(r1, 0xaeb7) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000180)=""/52) r3 = dup2(r2, r0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x3ff, @local, 0x1}, {0xa, 0x4e22, 0x4c5, @dev={0xfe, 0x80, [], 0x1f}, 0x401}, 0xfe, [0x7, 0xffff, 0x6, 0x10001, 0x1, 0xcb89, 0xfffffffffffffff7, 0x1]}, 0x5c) getpeername(r2, &(0x7f00000000c0)=@hci, &(0x7f0000000140)=0x80) 17:25:15 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x7}) 17:25:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x7, 0x80000) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x5000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0xe0e, 0x70bd2a, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x20008004) r4 = fcntl$dupfd(r1, 0x406, r0) accept4$vsock_stream(r4, &(0x7f00000000c0)={0x28, 0x0, 0x2710}, 0x10, 0x80800) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f00000002c0)=0x7fff) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r6, 0xc00caee0, &(0x7f0000000400)={0x5, 0xffffffffffffffff}) r8 = dup2(r0, r7) ioctl$GIO_UNIMAP(r8, 0x4b66, &(0x7f0000000080)={0x8, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}]}) 17:25:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0800001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:15 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x27}) 17:25:15 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) symlinkat(&(0x7f00000002c0)='./file0\x00', r0, &(0x7f0000000300)='./file0\x00') getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000240), &(0x7f0000000280)=0x10) r2 = dup2(r1, r0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000100)={{{@in=@broadcast, @in6=@ipv4={[], [], @broadcast}}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) listen(r0, 0x8001) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000080)={{0x0, 0x3, 0x2b, 0x3, 0xfffffffffffffffc}, 0x400, 0x2be, 0x2}) 17:25:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x2000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x100000001, 0xb62268e79518863c) ioctl$VIDIOC_G_MODULATOR(r4, 0xc0445636, &(0x7f0000000080)={0x4, "91e818fe30a1727afa1d738bc519564c17d687f10a5a3003a8816e496e8d4858", 0x20, 0x10001, 0x80, 0x1d, 0x2}) dup2(r0, r3) 17:25:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e00e0001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:15 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x44}) 17:25:15 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x80850000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:15 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x1200}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:15 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = dup(r0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/34) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) getsockopt$inet_buf(r1, 0x0, 0x2d, &(0x7f00000000c0)=""/35, &(0x7f0000000100)=0x23) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) r4 = getuid() r5 = geteuid() mount$bpf(0x0, &(0x7f0000000140)='\x00', &(0x7f0000000180)='bpf\x00', 0x2000, &(0x7f0000000240)={[{@mode={'mode', 0x3d, 0xcc63}}], [{@appraise_type='appraise_type=imasig'}, {@appraise_type='appraise_type=imasig'}, {@uid_eq={'uid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@dont_measure='dont_measure'}, {@euid_eq={'euid', 0x3d, r4}}, {@pcr={'pcr', 0x3d, 0x39}}, {@uid_gt={'uid>', r5}}, {@obj_type={'obj_type', 0x3d, '/dev/audio#\x00'}}, {@dont_hash='dont_hash'}]}) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1ff, 0x2000) r6 = dup2(r2, r0) ioctl$VIDIOC_DBG_G_REGISTER(r6, 0xc0385650, &(0x7f0000000000)={{0x3, @addr=0x8}, 0x8, 0x9, 0xfffffffffffffff8}) 17:25:16 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x3426}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e00fb001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:16 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xbbdf0000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @loopback}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@empty}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000640)=0xe8) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x3, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x7}, {&(0x7f0000000180)="c82b0be437c97248165131e07752091cce7e7db0f7beeabe843a3a3927557202540d2bbb9704fdeaf9e35359133c838f3a5a8d83252126bf764525f8f6d14b0bd7ddabc4b12bc5316caa1545f093c51d0aa307691f4ffea54e8391f8efcac186e9208329ed489d7129b4f808cdbf488ada8c2f0f3ab1344eb3f75ceac9c7651eafe880cab37b9758c57706d89f577e9e4aa6dc17c89c33b86ac36b9503417cdf3d6cdf468f13684c72ceffe4b71efc23ad07dd87f5e6beed9627b44d8946f4000f391e705b2f964941e0a3ff3bca18d211cd3831b6e4b666821d290e", 0xdc, 0x100000001}, {&(0x7f0000000280)="53a7bb18c86ab6613aeb03a7409a79c761a9191091f58648b91a955a01058fded81d0e5c770be8ee3a800416032c1a2282d180b3b1bd515860879d99aef4007369d722b65987c0aa6270c457fa64087a982c99038343c210946639bf0b8efa947f8b3c2ba8452c10890c8b0730d69cf99367ad8450cc8b1b6bdad5484a1674cc5381e68917276c0f6996e8c67bed4c9e20974fb858cafa8ba48433b8228a958078282769c63e1a64135d5345650d3d305ef60e0a29e6ff4e703ea32d9a", 0xbd}], 0x4, &(0x7f0000000680)={[{@errors_remount='errors=remount-ro'}, {@disable_sparse_no='disable_sparse=no'}, {@fmask={'fmask', 0x3d, 0x2}}, {@case_sensitive_no='case_sensitive=no'}, {@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r2}}, {@dmask={'dmask'}}, {@disable_sparse_no='disable_sparse=no'}], [{@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r3}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'system'}}]}) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r4, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) r6 = dup2(r0, r5) setsockopt$netlink_NETLINK_NO_ENOBUFS(r6, 0x10e, 0x5, &(0x7f0000000080)=0x7, 0x4) 17:25:16 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x3}) 17:25:16 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340), 0x0, &(0x7f0000000000), 0xfffffffffffffd4a}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f00000001c0)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e22, 0x0, @mcast1, 0x1}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e21, 0xbb3, @loopback, 0x3}, @in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0xfffffffffffffffd, @local, 0x9}], 0xa4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000080)={0x4, 0x0, 0x10001, 0x3}) r5 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x1, 0x82840) ioctl$UI_SET_SNDBIT(r5, 0x4004556a, 0x4) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f00000000c0)={0x5c, r4}) r6 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7ff, 0x0) ioctl$TIOCNOTTY(r6, 0x5422) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) dup2(r1, r0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000280)=0x1004020, 0x4) 17:25:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e2719001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:16 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x10000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:16 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x21}) 17:25:16 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x180000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e000000fb30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x20000, 0x0) setsockopt$inet6_int(r2, 0x29, 0x4e, &(0x7f0000000280)=0x401, 0x4) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) recvfrom$inet6(r4, &(0x7f00000001c0)=""/1, 0x1, 0x2143, &(0x7f0000000200)={0xa, 0x4e20, 0x8, @mcast2, 0x40}, 0x1c) setsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000000)="40041628c649e6b8425968497c9c369bed57d6a4f5811276", 0x18) recvfrom$unix(r0, &(0x7f0000000080)=""/50, 0x32, 0x40010000, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r5 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r5, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r1, r6) 17:25:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e00f0001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:16 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x0, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}) 17:25:16 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x39}) 17:25:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0ec0001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:16 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x186000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:16 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x4000) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000040)={0xc, @capture={0x1000, 0x1, {0x9}, 0x3, 0x7}}) shutdown(r0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r2, r0) 17:25:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e000000fa30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:17 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x2000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:17 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x12}) 17:25:17 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r1, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000480)={0x0, 0x1c9c380}) r2 = dup2(r1, r0) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000000)=""/158, &(0x7f00000000c0)=0x9e) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)={0x230, r3, 0x4, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x60, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x800}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x55}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffffffffffc1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x800000000}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_NET={0x60, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7fff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x40}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2b}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xb0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x177}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x40}, 0x4044011) 17:25:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0f00001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x4002, 0x10) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000000)={0x0, r3, 0x7fffffff, 0x3, 0x3, 0x5}) 17:25:17 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0xff0700}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e000f001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:17 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = memfd_create(&(0x7f0000000180)=')cpuset\x00', 0x5) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f00000001c0)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$swradio(&(0x7f0000001140)='/dev/swradio#\x00', 0x1, 0x2) recvmmsg(r1, &(0x7f0000003bc0)=[{{&(0x7f0000000240)=@pppol2tp, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/224, 0xe0}, {&(0x7f00000003c0)=""/238, 0xee}, {&(0x7f00000004c0)=""/104, 0x68}], 0x3, &(0x7f0000000580)=""/203, 0xcb}, 0x4}, {{&(0x7f0000000680)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000700)=""/169, 0xa9}, {&(0x7f00000007c0)=""/123, 0x7b}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000000840)=""/75, 0x4b}, {&(0x7f00000008c0)=""/160, 0xa0}, {&(0x7f0000000980)=""/238, 0xee}, {&(0x7f0000000a80)=""/26, 0x1a}], 0x7, &(0x7f0000000b40)=""/109, 0x6d}, 0xffffffffffffffff}, {{&(0x7f0000000bc0)=@xdp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000000c40)=""/171, 0xab}, {&(0x7f0000000d00)=""/139, 0x8b}, {&(0x7f0000000dc0)=""/48, 0x30}, {&(0x7f0000000e00)=""/77, 0x4d}, {&(0x7f0000000e80)=""/197, 0xc5}, {&(0x7f0000000f80)=""/232, 0xe8}, {&(0x7f0000001080)=""/161, 0xa1}, {&(0x7f0000003d40)=""/31, 0x1f}, {&(0x7f0000001180)=""/45, 0x2d}], 0x9, &(0x7f0000001280)=""/113, 0x71}, 0x8}, {{&(0x7f0000001300)=@hci, 0x80, &(0x7f0000002640)=[{&(0x7f0000002400)=""/249, 0xf9}, {&(0x7f0000002500)=""/250, 0xfa}, {&(0x7f0000002600)=""/48, 0x30}], 0x3, &(0x7f0000002680)=""/1, 0x1}, 0x401}, {{&(0x7f00000026c0)=@nl=@unspec, 0x80, &(0x7f0000003800)=[{&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/189, 0xbd}], 0x2, &(0x7f0000003840)=""/114, 0x72}, 0x2}, {{&(0x7f00000038c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000003ac0)=[{&(0x7f0000003940)=""/128, 0x80}, {&(0x7f00000039c0)=""/55, 0x37}, {&(0x7f0000003a00)=""/71, 0x47}, {&(0x7f0000003a80)=""/13, 0xd}], 0x4, &(0x7f0000003b00)=""/167, 0xa7}, 0x3ff}], 0x6, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}) r3 = dup2(r2, r1) getpeername$packet(r3, &(0x7f0000000100), &(0x7f0000000140)=0x14) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) fstat(r3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) fchown(r2, r4, r5) 17:25:17 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x2}) 17:25:17 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0xfbbf000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:17 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r1, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r2, r1) 17:25:17 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x4}) 17:25:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0200001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:17 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0xf00}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005efb00001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:17 executing program 1: r0 = epoll_create1(0x80000) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r1, r4) 17:25:17 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000000000), 0x400000000000041, 0x12101, &(0x7f0000000040)={0x77359400}) dup2(r1, r0) 17:25:17 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x7f000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:17 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x45}) 17:25:17 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) prctl$PR_SVE_SET_VL(0x32, 0x800003f47f) r2 = dup2(r1, r0) fadvise64(r1, 0x0, 0xffffffff, 0x3) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000040)=0x7, 0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x401}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000000c0)={r3, 0x1000, "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"}, &(0x7f0000001100)=0x1008) 17:25:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005ec00e001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e1927001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/238) dup2(r1, r4) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'gretap0\x00', {0x2, 0x4e23, @local}}) 17:25:18 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x28001}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:18 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0xfffffffffffffffc) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:18 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x28}) 17:25:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005ef000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:18 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x800300}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r0, 0x9) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(r1, 0x5606, 0xfffffffffffffffa) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x1e, &(0x7f0000000140)="ceacd67cc525d6e876e23c8c0edfcd8e37db40ba1fff7eb216fac2f0c9a5103b9649b8f8276323e919fccf1f7bd7e42d389036ec8f2fbb088aa465c2215748c66f770bdac860a884fbb23346c3e45afab11d7d360f1576cec2729d48f3ca1b403b2f42e36348b2bccfbdf83c2665078e2352d0a314b385ab89426ce9d6935da9d13aaebac553", 0x86) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r4) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 17:25:18 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x2d}) 17:25:18 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x20}}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1d}}, {0x2, 0x4e23, @loopback}, 0x80, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00', 0x5, 0x5, 0x5}) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e1000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:18 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x28000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:18 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x14}) 17:25:18 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = getuid() quotactl(0x2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000080)="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") mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3, &(0x7f0000000000)=0x1, 0x49a, 0x1) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) r3 = dup2(r1, r0) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f0000001080)=""/219, &(0x7f0000001180)=0xdb) 17:25:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000f01d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) r6 = dup2(r1, r3) getsockopt$inet_udp_int(r5, 0x11, 0xb, &(0x7f0000000200), &(0x7f0000000240)=0x4) linkat(r5, &(0x7f00000000c0)='./file0\x00', r6, &(0x7f0000000100)='./file0\x00', 0x400) getsockopt$IP_VS_SO_GET_TIMEOUT(r6, 0x0, 0x486, &(0x7f0000000180), &(0x7f00000001c0)=0xc) dup2(r0, r4) 17:25:18 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x580200}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) [ 2527.480864] IPVS: length: 219 != 8 17:25:18 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x2f}) 17:25:18 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0xd00}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0010001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:18 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6, 0x4000) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000100)=0x9) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000040)=""/189) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r1, 0x4) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r1, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r2, r1) 17:25:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/user\x00', 0x2, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0xf740000000000000, 0x80602) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r3, 0x4010ae94, &(0x7f0000000180)={0x400000000008, 0xd5, 0x9}) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000000c0)={'lo\x00', {0x2, 0x4e24, @loopback}}) dup2(r0, r4) socket$alg(0x26, 0x5, 0x0) 17:25:18 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x21}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0008001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:18 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000000)="1a798e045ececf04ddb3b9aa506fb0998ab7fa58a00e71b57fffd8b9ef02c2f949f8174b099d1e9146d261ddfbcdde01d8f6880b39", 0x35) dup2(r1, r0) 17:25:18 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x37}) 17:25:18 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x18001}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e00000f1d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) truncate(&(0x7f0000000000)='\x00', 0x6) 17:25:19 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x968b}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:19 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x25}) 17:25:19 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) dup2(r1, r0) 17:25:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0027191d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:19 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x4000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:19 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x3d}) 17:25:19 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x2100000000000000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:19 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001140)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/43}, {&(0x7f0000000240)=""/150}, {&(0x7f0000000300)=""/38}, {&(0x7f0000000340)=""/122}], 0x0, &(0x7f0000000400)=""/160}, 0x1}, {{&(0x7f00000004c0)=@generic, 0x0, &(0x7f0000000680)=[{&(0x7f0000000540)=""/220}, {&(0x7f0000000640)=""/52}, {&(0x7f0000001400)=""/4096}], 0x0, &(0x7f00000006c0)=""/148}, 0xe70}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000780)=""/78}]}}, {{&(0x7f0000000840)=@sco, 0x0, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/201}]}, 0x7}, {{&(0x7f0000000a00)=@in={0x2, 0x0, @dev}, 0x0, &(0x7f0000000a80), 0x0, &(0x7f0000002400)=""/4096}, 0x3}, {{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000ac0)=""/124}, {&(0x7f0000000b40)=""/137}, {&(0x7f0000000c00)}, {&(0x7f0000000c40)=""/236}, {&(0x7f0000000d40)=""/229}, {&(0x7f0000000e40)=""/36}, {&(0x7f0000000e80)=""/96}], 0x0, &(0x7f0000000f80)=""/20}, 0x100}, {{&(0x7f0000000fc0)=@hci, 0x0, &(0x7f00000010c0)=[{&(0x7f0000001040)=""/114}], 0x0, &(0x7f0000001100)=""/8}, 0x559baf65}], 0xd4, 0x2, &(0x7f00000013c0)={r2, r3+30000000}) r4 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) fsetxattr$security_ima(r1, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@sha1={0x1, "454d92eca73c0471e091145203393b7881adddfe"}, 0x15, 0x3) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000)=0x9, 0x4) connect$unix(r4, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) dup2(r1, r0) 17:25:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x404000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xfc18, 0x0) write$FUSE_LSEEK(r3, &(0x7f0000000080)={0x18, 0x0, 0x4, {0x3}}, 0x18) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) write$FUSE_NOTIFY_DELETE(r3, &(0x7f00000000c0)={0x37, 0x6, 0x0, {0x0, 0x2, 0xe, 0x0, '/dev/admmidi#\x00'}}, 0x37) dup2(r0, r4) 17:25:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000fb1d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x40000000084, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, &(0x7f0000000140)={0xa2, 0x38414261, 0x3, @stepwise={0x81, 0x1ff, 0x3ff, 0x0, 0x2, 0xffffffffffffff00}}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000400)={0x2, 0xffffffffffffffff}) r5 = dup2(r0, r4) accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f00000000c0)=0x10, 0x80000) 17:25:19 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x11}) 17:25:19 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f000048a000), 0x27e, 0xffffffffffffffff}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4000, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000040)={0xc8, 0xfffffffffffffff5, 0x1, [{0x1, 0x1, 0x4, 0xfffffffffffffffb, 'eth1'}, {0x1, 0x8000, 0x1a, 0x2, 'ppp0)wlan1&@{-%keyringproc'}, {0x5, 0x1, 0x2, 0x7, '}\''}, {0x1, 0x3, 0x0, 0x5}, {0x5, 0x0, 0xb, 0x0, '#!\xc9~cpusete'}]}, 0xc8) shutdown(r1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) ioctl$FICLONE(r1, 0x40049409, r1) dup2(r2, r0) 17:25:19 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x6000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000000000)=""/48) r3 = getpgid(0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) kcmp(r3, r4, 0x6, r0, r0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x22000, 0x0) r6 = inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x80000041) inotify_rm_watch(r5, r6) r7 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) fstat(r7, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000200)={0x800}, 0x4) ioctl$KVM_CREATE_DEVICE(r7, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r9, 0x0, 0x0, @in={0x2, 0x4e23, @broadcast}}}, 0x90) dup2(r1, r8) 17:25:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e000ec01d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:19 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x22}) 17:25:19 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x108}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) 17:25:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x8000, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r5, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r0, @ANYBLOB="42080000b1ff71ab7673d6593e430c0963fe83cae40000000000000000000000000000"]) socket$alg(0x26, 0x5, 0x0) dup2(r1, r4) 17:25:20 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x25800}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:20 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x36}) 17:25:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e00fb001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:20 executing program 1: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x4, 0xffffffffffffffff}) dup2(r0, r3) 17:25:20 executing program 3: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0xc00000000000000, 0x38000}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) close(r3) execve(0x0, 0x0, 0x0) [ 2529.278556] ------------[ cut here ]------------ [ 2529.305183] refcount_t: increment on 0; use-after-free. [ 2529.324922] WARNING: CPU: 1 PID: 5695 at lib/refcount.c:153 refcount_inc_checked+0x5d/0x70 [ 2529.333382] Kernel panic - not syncing: panic_on_warn set ... [ 2529.339296] CPU: 1 PID: 5695 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 2529.346591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2529.355967] Call Trace: [ 2529.358589] dump_stack+0x244/0x39d [ 2529.362242] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2529.367466] panic+0x2ad/0x55c [ 2529.370690] ? add_taint.cold.5+0x16/0x16 [ 2529.374907] ? __warn.cold.8+0x5/0x45 [ 2529.378734] ? refcount_inc_checked+0x5d/0x70 [ 2529.383258] __warn.cold.8+0x20/0x45 [ 2529.386994] ? rcu_softirq_qs+0x20/0x20 [ 2529.391014] ? refcount_inc_checked+0x5d/0x70 [ 2529.395548] report_bug+0x254/0x2d0 [ 2529.399198] do_error_trap+0x11b/0x200 [ 2529.403106] do_invalid_op+0x36/0x40 [ 2529.406838] ? refcount_inc_checked+0x5d/0x70 [ 2529.411368] invalid_op+0x14/0x20 [ 2529.414842] RIP: 0010:refcount_inc_checked+0x5d/0x70 [ 2529.419961] Code: 1d 23 ba 80 06 31 ff 89 de e8 ef 74 ed fd 84 db 75 df e8 16 74 ed fd 48 c7 c7 c0 b7 60 88 c6 05 03 ba 80 06 01 e8 13 d4 b6 fd <0f> 0b eb c3 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 [ 2529.438887] RSP: 0018:ffff888180417708 EFLAGS: 00010286 [ 2529.444298] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90007e62000 [ 2529.451611] RDX: 000000000000cf88 RSI: ffffffff8165e495 RDI: 0000000000000005 [ 2529.458909] RBP: ffff888180417710 R08: ffff8881c27b26c0 R09: ffffed103b5e5020 [ 2529.466200] R10: ffffed103b5e5020 R11: ffff8881daf28107 R12: 0000000020000400 [ 2529.473524] R13: ffff8881804177c0 R14: ffffffff894b6e20 R15: ffff8881be5de880 [ 2529.480860] ? vprintk_func+0x85/0x181 [ 2529.484799] ? refcount_inc_checked+0x5d/0x70 [ 2529.489322] kvm_vm_ioctl+0xedf/0x1d60 [ 2529.493235] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 2529.498369] ? kvm_set_memory_region+0x50/0x50 [ 2529.502990] ? check_preemption_disabled+0x48/0x280 [ 2529.508039] ? debug_smp_processor_id+0x1c/0x20 [ 2529.512745] ? lock_is_held_type+0x210/0x210 [ 2529.517199] ? mark_held_locks+0x130/0x130 [ 2529.521454] ? zap_class+0x640/0x640 [ 2529.525184] ? do_futex+0x249/0x26d0 [ 2529.528942] ? rcu_softirq_qs+0x20/0x20 [ 2529.532959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2529.538530] ? check_preemption_disabled+0x48/0x280 [ 2529.543601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2529.549172] ? find_held_lock+0x36/0x1c0 [ 2529.553274] ? __fget+0x4aa/0x740 [ 2529.556738] ? lock_downgrade+0x900/0x900 [ 2529.560880] ? check_preemption_disabled+0x48/0x280 [ 2529.565894] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2529.570836] ? kasan_check_read+0x11/0x20 [ 2529.575032] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2529.580329] ? rcu_softirq_qs+0x20/0x20 [ 2529.584334] ? __fget+0x4d1/0x740 [ 2529.586222] kobject: 'loop5' (000000008c782452): kobject_uevent_env [ 2529.587833] ? ksys_dup3+0x680/0x680 [ 2529.587854] ? __might_fault+0x12b/0x1e0 [ 2529.587875] ? lock_downgrade+0x900/0x900 [ 2529.594789] kobject: 'loop5' (000000008c782452): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2529.598061] ? lock_release+0xa00/0xa00 [ 2529.598077] ? perf_trace_sched_process_exec+0x860/0x860 [ 2529.598099] ? kvm_set_memory_region+0x50/0x50 [ 2529.598118] do_vfs_ioctl+0x1de/0x1790 [ 2529.633689] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 2529.638910] ? ioctl_preallocate+0x300/0x300 [ 2529.643386] ? selinux_file_mprotect+0x620/0x620 [ 2529.648192] ? interval_tree_insert+0xa0/0x260 [ 2529.652827] ? __sanitizer_cov_trace_cmp4+0xb/0x20 [ 2529.657804] ? put_timespec64+0x10f/0x1b0 [ 2529.662016] ? nsecs_to_jiffies+0x30/0x30 [ 2529.666184] ? do_syscall_64+0x9a/0x820 [ 2529.670188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2529.675759] ? security_file_ioctl+0x94/0xc0 [ 2529.680234] ksys_ioctl+0xa9/0xd0 [ 2529.683721] __x64_sys_ioctl+0x73/0xb0 [ 2529.687658] do_syscall_64+0x1b9/0x820 [ 2529.691572] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2529.696955] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2529.701913] ? trace_hardirqs_off_thunk+0x1a/0x1c 17:25:20 executing program 4: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0xffffffffffffff17, &(0x7f0000001340), 0x324, &(0x7f000048a000), 0xfffffffffffffed1}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) shutdown(r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x2040) write$UHID_CREATE(r2, &(0x7f0000000140)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000040)=""/234, 0xea, 0x18, 0x10001, 0x126d, 0x9, 0xfffffffffffff452}, 0x120) dup2(r1, r0) 17:25:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e00e0001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 17:25:20 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x15}) 17:25:20 executing program 5: link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x80850000, 0x0, 0x8085000000000000}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) 17:25:20 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x30}) [ 2529.706784] ? trace_hardirqs_on_caller+0x310/0x310 [ 2529.711828] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2529.716872] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2529.721914] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2529.726796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2529.732000] RIP: 0033:0x457669 [ 2529.735207] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2529.754134] RSP: 002b:00007fde1b960c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2529.761899] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 2529.769189] RDX: 0000000020000400 RSI: 00000000c00caee0 RDI: 0000000000000007 [ 2529.776494] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2529.783805] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fde1b9616d4 [ 2529.791098] R13: 00000000004c00b8 R14: 00000000004d1128 R15: 00000000ffffffff [ 2529.799530] Kernel Offset: disabled [ 2529.803179] Rebooting in 86400 seconds..